Developers: | American International Group (AIG), AIG Insurance (AIG insurance company, earlier Chartis) |
Date of the premiere of the system: | 2014 |
Last Release Date: | 2017 |
Branches: | Insurance |
Content |
2017: Development of a system of assessment of cyberrisks
In December, 2017 the AIG company announced start of the system estimating cyberrisks of clients and providing more advanced analysis of insurance upon the hacker attacks.
Since November, 2017 underwriters of AIG use a method of the computer analysis which integrates information from the new insurance application developed for this process and data on the current cyberthreats to generate estimates according to different concurrent factors.
The IT system estimates extent of expected influence of cyber attack to business of the company and potential damage from different cyberincidents and also makes the reports on cyberrisks containing the same information which is used by underwriters for clients.
The question of cyberinsurance becomes more and more sharp around the world because of the growing number and increase in complexity of the hacker attacks. Insurance companies try to estimate the potential risk exposure as interest in insurance and cyberrisks grow, Reuters notes.
In October, 2017 AIG stated that it will consider all types of an insurance coverage better to estimate the weak points at assessment of cyberrisks. Other policies of assurance, for example, on the real estate or commercial transport, often do not give information on whether cyberincidents become covered, leaving insurers without clear picture of their general financial risk.
In December AIG announced partnership with cybersecurity companies CrowdStrike and Darktrace for start of CyberMatics service which checks information obtained by AIG from client means of ensuring of cyber defense. According to the president of Darktrace Nicole Eagan, the service uses artificial intelligence to study network of the insured company on existence of strong and weak points.[1]
2016: Group-IB TDS & AIG CyberEdge - the combined product of protection and insurance upon cybercrimes
On December 7, 2016 the companies Group-IB also AIG announced creation of the complex product Group-IB TDS & AIG CyberEdge. In its structure of function of network traffic control, identification of the purposeful attacks, liability insurance and financial risks.
The product is created as means of opposition to a wave of cyber crime.
The solution Group-IB on detection of the target attacks of TDS used by the largest Russian enterprises for years of work did not miss any critical threat. At the same time, any of cybersecurity products cannot provide 100% of protection against cybercriminals and if someone approves to you the return – it will lie. In order that our clients felt safe, we in partnership with AIG in Russia developed really the innovation product on a joint of two directions of business – counteractions to cyberthreats and insurance upon them. It does not have analogs in the Russian market today. |
Group-IB TDS & AIG CyberEdge includes services for identification of the infected devices in network, to prevention of crimes at a preparation stage, protection against theft of data, to insurance on a case of success of malefactors. Action of a product extends to risks of leakage of corporate or personal data and violation of security of the computer system caused by infection, or damage of information. In case of approach of an insurance event the covering of Group-IB TDS & AIG CyberEdge will include expenses on program technical expertize, response to an incident by forces of experts in cyber security, recovery of the lost data and reputation of the insurer and his workers.
Our joint product with Group-IB – logical complementarity of two functions: constructions of protection of a system for the purpose of prevention of an incident and settlement of its effects if date leak after all took place. It is necessary to understand that in some cases cybercriminals for commission of the attacks use not only purely technical means – are used social engineering, deception, bribery, use of insiders. Reflect such sophisticated attacks extremely difficult, but with the advent of Group-IB TDS & AIG CyberEdge any company can find security guarantees. |
2014
Insurance programs of cyber-risks CyberEdge. Protection against date leak
The policy of assurance of cyber-risks of CyberEdge offered by AIG company represents the special insurance program for ensuring information protection of personal and other data of the third parties at the enterprise from effects of their leak or illegal use. Except obligatory coverings – losses in connection with violations of data, costs for investigation and expenses on reaction, the policy also covers a number of additional risks, in particular, the breaks in production caused by all types of cyber attacks, virtual racketing and failures in network functioning because of a cyber-incident. Also expenses on overcoming reputational risks and risk of loss of clients are provided.
The question of confidential information protection and personal data on the Internet is particularly acute more than ever today. Any company performing daily processing of electronic personal data by means of use of portable devices, computers, servers, Internet resources is exposed to risks of cyber attacks. Effects of cyber attacks, such as, for example, date leak from your servers, can be very essential. Therefore today it is necessary to pay the main attention to protection against cyber attack, against network hacking and personal data information systems.
The AIG company developed CyberEdgeSM packet – the special program of cyberinsurance for ensuring information personal data protection at the enterprise from effects of their leak or illegal use.
Cyber-risks can be different: from loss of information on one notebook before the attacks connected with functioning of the systems of calculations. The companies also face such problems as failure in work of information systems or cracking of the website.
Loss or personal data leakage can lead to penalties and cause damage to reputation of the company. The hacker attacks can cause a stop of operation of servers, loss of trust to the company and loss of profit. For this reason insurance of information risks is necessary today for any company whose work is directly connected with electronic data processing
Insurance coverage
The responsibility connected with use of personal data or corporate information: losses of the Insurer, including the expenses on protection resulting from the stated or actual violation of personal data or corporate information.
Having rummaged in activity of enterprise/network (an additional option): a covering of loss of net profit as a result of a long break in functioning of network of the insurer called by an attack on network resources and services for the purpose of suspension of operations and difficulty of access to them or violation of a security system of network.
Responsibility, for contents of information (an additional option): a covering of losses and expenses as a result of the public disclosure caused by the stated or actual action, an error, the false declaration, the misleading statement or omission in connection with activity in the area multimedia.
Virtual racketing (additional option): the money paid from the written consent of the Insurer for restriction or the termination of security risk which differently can cause a loss to the Insurer.
Investigations from regulating authorities: a covering of potentially large costs and expenses connected with conducting investigations by regulating authorities.
Anti-recessionary PR: services in reaction in case of date leak, recovery of personal reputation, instructing on a case of a personal data leakage and also expenses on the notifications and monitoring connected with information leak.
Electronic data: a covering of the expenses connected with recovery repeated collecting or reconstruction of information after leak or unauthorized use of data.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls