Description
The CyberEdge Mobile App combines the latest cyber breach information, news, opinion, and risk analysis users want at their fingertips. With a sleek look and many features globalized, the app is the first-of-its-kind and is now available for the iPad,® iPhone,® and Android.
End-to-End Cyber Risk
Management Solutions from AIG
In a rapidly changing landscape, CyberEdge
®
provides clients with an end-to-end risk
management solution to stay ahead of the curve
of cyber risk. CyberEdge helps clients prevent
and safeguard against sensitive data breaches,
computer hacking, employee error, and more.
End-to-End Risk Management Solution
From our innovative loss
prevention tools to educate and
potentially prevent a breach, to
the services of our CyberEdge
Breach Resolution Team if a
breach does occur, insureds
receive responsive guidance
every step of the way.
CyberEdge Mobile App for iPhone,
®
iPad,
®
and Android
TM
The CyberEdge Mobile App combines the latest cyber breach information, news,
opinion, and risk analysis users want at their ?ngertips. With a sleek look and many
features globalized, the app is the ?rst-of-its-kind and is now available for the
iPad,
®
iPhone,
®
and Android.
TM
Going Global
• Data Breach Threat Map displays breaches from around the world.
• Available in English, French, and Spanish.
• CyberEdge marketing documents, applications, and specimen
policy language for many countries where coverage is available.
User Friendly
• Share, Tweet, or email content from
pages in the app. Drop down news
?lter provides focused and relevant
search results.
• Learn more about breach noti?cation
regulations in the state where the
breach occurred right from the Data
Breach Threat Map.
Tools for Tomorrow
Infrastructure Vulnerability Scanning Powered by IBM
Our quali?ed clients receive infrastructure vulnerability scanning powered by
IBM. IBM will leverage its robust Managed Security Services capability to
conduct remote scanning for clients’ web-facing external infrastructure, which
will help to identify potential vulnerabilities that could be exploited by a remote
hacker via the Internet.
In addition, the infrastructure vulnerability scanning service:
• Leverages advanced scanning capabilities to detect and prioritize hidden risks
on public-facing and internal network infrastructure.
• Provides a detailed view of a
company’s vulnerability status
to clients can better track,
understand, and report on their
security posture.
• Prioritizes vulnerabilities so
clients reduce their overall
threat exposure.
• Unique reporting capabilities
to help speed vulnerability
identi?cation and remediation.
K ey Components
•Reports help demonstrate compliance with federal,
state, and industry regulations
•Assess an environment from either the external or
internal perspective
•IBM Security expertise improves accuracy of ?ndings
and reduces mitigation time
•Consultation on recommendations for improved
K ey Components
•
•
•
• security
The protection that CyberEdge provides is a valuable additional layer to the most powerful ?rst line of
defense against cyber threats—a company’s own IT system. Constantly monitoring the cyber landscape, we
keep insureds at the forefront of the industry as cyber risks continue to evolve. Our preventative tools provide
our clients with the knowledge, training, security, and consultative solutions to help them stay ahead of the
curve and our breach resolution team provides responsive guidance based on years of experience.
CyberEdge RiskTool
CyberEdge RiskTool, our single, web-based platform,
helps clients streamline the risk management process.
The platform’s content is highly customizable and
can be tailored speci?cally to meet a number of risk
management needs.
Risk management modules include:
• Security: Provides an interface where an IT
department can manage a company’s shunning
technology, which blocks known cyber criminals
from communicating with a company’s network.
• Training: Includes pre-populated training content
and tests with an online assignment engine to
deploy employee training and awareness with the
click of a mouse.
• Compliance: Comes pre-loaded with security
policy templates that can be accepted or modi?ed
to ?t each company’s needs. Existing policies
can also be uploaded and tasked to employees
or third-party vendors to con?rm receipt and
acceptance.
Proactive Shunning Service Powered by
RiskAnalytics
RiskAnalytics provides quali?ed clients with leading
edge intelligence that isolates and shuns bad IP
addresses, preventing them from entering and exiting
a company’s network. With millions of known “bad”
actors constantly updated on the current shun list,
RiskAnalytics’ technology identi?es and blocks the
largest sources for malware, crimeware, and fraud.
RiskAnalytics will provide quali?ed insureds with the
most appropriate cloud services and/or appliance
that best ?ts an insured’s needs and network speeds.
An example of the
AutoShun hardware device.
Responsive Guidance When Needed Most
The CyberEdge Breach Resolution Team is ready to assist insureds as soon
as they suspect a potential network breach. If a breach is suspected to occur,
insureds will be connected with our CyberEdge Breach Resolution Team with
over 15 years’ worth of experience in handling cyber-speci?c claims. Insureds
have access to an IBM supported hotline for IT professionals to consult on
identifying key indicators of a breach. Backed by the strength of our extensive
vendor network, the CyberEdge Breach Resolution Team provides the
additional layer of support an IT department needs to face a cyber attack.
The CyberEdge Breach Resolution Team Provides:
Rapid Support When Needed the Most
• Our team has local presence supported by global resources.
• This structure allows our experts to manage unfolding events and quickly
respond to inquiries.
• Claims specialists have the authority to promptly make decisions and rapidly
assist clients who may have just faced a breach.
Long-Established Expert Vendor Network
• IBM and our expert network of legal ?rms, forensic investigators, public
relations ?rms, and more offer immediate support for our insureds facing a
cyber attack, anytime and anywhere.
• When a breach event occurs, time is of the essence. Having a response plan
in place with access to third-party resources will help you ef?ciently and
cost-effectively respond to and recover from a breach.
Unprecedented Claims Handling Experience
• Since introducing cyber liability insurance in 1999, we have helped
thousands of companies and more than twenty million individuals respond
to a cyber attack.
• The breadth of our claims inventory means that we are uniquely positioned
to identify and anticipate claim trends and settlement values.
• On average, our claims specialists have more than seven years of industry
experience handling the most complex ?rst-party and third-party cyber claims.
Need to Report a Breach?
Call our CyberEdge
Resolution Team at
1-800-CYBR-345
Key Coverage Advantages
Security and privacy liability insurance covers third-party claims
arising from a failure of the insured’s network security or a failure to protect
data. Insurance also responds to regulatory actions in connection with a
security failure, privacy breach, or the failure to disclose a security failure or
privacy breach.
Event management insurance responds to a security failure or privacy
breach by paying costs of noti?cations, public relations, and other services
to assist in managing and mitigating a cyber incident. Forensic investigations,
legal consultations, and identity monitoring costs for victims of a breach are
all included.
Network business interruption responds to a material interruption
of an insured’s business operations caused by a network security failure by
reimbursing for resulting lost income and operating expenses.
Cyber extortion insurance responds to the threat of intentional security
attacks against a company by an outsider attempting to extort money,
securities, or other valuables. This includes monies paid to end the threat
and the cost of an investigation to determine the cause of the threat.
Cyber media insurance addresses the liability faced by companies that
distribute media content via their website. Coverage provided for numerous
perils including copyright infringement, trademark infringement, defamation,
and invasion of privacy.
Claim Bene?ts
• 24/7 access to our call center for claim reporting and guidance now
supported by IBM.
• Single point of entry to report, acknowledge, and process claims in a
timely fashion.
• Access to our local claims specialists on the ground around the world.
• Complimentary one hour consultation with a breach coach and access to
a breach response team to prepare for a cyber attack.
• Access to a panel of domestic and international attorneys with local
expertise in handling cyber claims.
• Access to eRisk Hub, powered by NetDiligence,
®
containing tools and
vendor information to minimize the effects of a breach.
Cyber Risk Travels the World
Through our global service platform Passport, powered by AIG Multinational,
clients are provided an ef?cient and seamless way to stay ahead of the curve
of cyber risk. Add the expertise of our local teams who have the know-how in
the places where you do business. Count on the CyberEdge Breach Resolution
Team for responsive guidance and assistance services that follow the sun. Our
end-to-end risk management solution knows no borders.
Better, Faster, and More Ef?cient Global Protection
Passport is a simple, effective means to far-reaching global advantages,
including:
• Coverage that is admitted locally and in sync with local laws, regulatory
requirements, language, and customs.
• Access to local experts in underwriting, claims, and litigation management.
• Easy to understand coverage, coordinated worldwide.
A Less Complex Way to Address Global Cyber Security Exposure
• Passport makes securing the necessary protection against cyber risk
around the world as simple as possible.
• A client receives one proposal detailing the terms of its global cyber
program, including the worldwide policy and any requested locally
admitted policies.
• The outlined coverage is accepted and it is done.
• Appropriate local policies are issued through our local of?ces around
the world. Local policies are crafted in accordance with local regulations,
industry practices, and exposures.
1
1
Limits are subject to capacity management; certain countries may limit the availability of either a single aggregate or a separate world limit.
Did You Know?
Local laws and regulations sometimes:
• Require that a cyber policy be issued by a locally
licensed carrier.
• Prohibit a local operation from having its parent
company’s policy pay claims directly into that country.
• May not be effectively addressed, or even considered,
in the wording of a global policy.
• Austria
• Australia
• Bahrain
• Belgium
• Brazil
*
• Bulgaria
• Canada
• Chile
• Colombia
• Cyprus
• Czech Republic
• Denmark
• Ecuador
• Finland
• France
• Germany
• Greece
• Hong Kong
• Hungary
• Ireland
• Israel
• Italy
• Japan
• Kuwait
• Lebanon
• Luxemburg
• Malaysia
• Mexico
• Netherlands
• New Zealand
• Norway
• Oman
• Panama
• Philippines
• Poland
• Portugal
• Puerto Rico
• Qatar
• Romania
• Russia
• Singapore
• Slovakia
• Spain
• South Africa
• South Korea
• Sweden
• Switzerland
• Taiwan
• Turkey
• UAE
• United Kingdom
• United States
• Uruguay
Passport for CyberEdge Destinations
* Special handling and additional premium required for Brazil.
New destinations are added constantly, so please check with a Passport representative for more information.
Want to Learn More?
Email us at [email protected] • Visit us at www.aig.com/CyberEdge • Download the CyberEdge Mobile App
Follow CyberEdge Follow @AIGinsurance
www.aig.com/CyberEdge [email protected]
American International Group, Inc. (AIG) is a leading international insurance organization serving customers in more than 130 countries. AIG companies serve commercial,
institutional, and individual customers through one of the most extensive worldwide property-casualty networks of any insurer. In addition, AIG companies are leading providers
of life insurance and retirement services in the United States. AIG common stock is listed on the New York Stock Exchange and the Tokyo Stock Exchange.
Additional information about AIG can be found at www.aig.com | YouTube: www.youtube.com/aig | Twitter: @AIGinsurance | LinkedIn: www.linkedin.com/company/aig
AIG is the marketing name for the worldwide property-casualty, life and retirement, and general insurance operations of American International Group, Inc. For additional
information, please visit our website at www.aig.com. All products and services are written or provided by subsidiaries or af?liates of American International Group, Inc. Products
or services may not be available in all countries, and coverage is subject to actual policy language. Non-insurance products and services may be provided by independent third
parties. Certain property-casualty coverages may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds, and insureds
are therefore not protected by such funds.
© 2014 American International Group, Inc. All rights reserved. 03/14
Apple, the Apple logo, iPhone and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.
Android and Google Play are trademarks of Google Inc.
doc_325302691.pdf
The CyberEdge Mobile App combines the latest cyber breach information, news, opinion, and risk analysis users want at their fingertips. With a sleek look and many features globalized, the app is the first-of-its-kind and is now available for the iPad,® iPhone,® and Android.
End-to-End Cyber Risk
Management Solutions from AIG
In a rapidly changing landscape, CyberEdge
®
provides clients with an end-to-end risk
management solution to stay ahead of the curve
of cyber risk. CyberEdge helps clients prevent
and safeguard against sensitive data breaches,
computer hacking, employee error, and more.
End-to-End Risk Management Solution
From our innovative loss
prevention tools to educate and
potentially prevent a breach, to
the services of our CyberEdge
Breach Resolution Team if a
breach does occur, insureds
receive responsive guidance
every step of the way.
CyberEdge Mobile App for iPhone,
®
iPad,
®
and Android
TM
The CyberEdge Mobile App combines the latest cyber breach information, news,
opinion, and risk analysis users want at their ?ngertips. With a sleek look and many
features globalized, the app is the ?rst-of-its-kind and is now available for the
iPad,
®
iPhone,
®
and Android.
TM
Going Global
• Data Breach Threat Map displays breaches from around the world.
• Available in English, French, and Spanish.
• CyberEdge marketing documents, applications, and specimen
policy language for many countries where coverage is available.
User Friendly
• Share, Tweet, or email content from
pages in the app. Drop down news
?lter provides focused and relevant
search results.
• Learn more about breach noti?cation
regulations in the state where the
breach occurred right from the Data
Breach Threat Map.
Tools for Tomorrow
Infrastructure Vulnerability Scanning Powered by IBM
Our quali?ed clients receive infrastructure vulnerability scanning powered by
IBM. IBM will leverage its robust Managed Security Services capability to
conduct remote scanning for clients’ web-facing external infrastructure, which
will help to identify potential vulnerabilities that could be exploited by a remote
hacker via the Internet.
In addition, the infrastructure vulnerability scanning service:
• Leverages advanced scanning capabilities to detect and prioritize hidden risks
on public-facing and internal network infrastructure.
• Provides a detailed view of a
company’s vulnerability status
to clients can better track,
understand, and report on their
security posture.
• Prioritizes vulnerabilities so
clients reduce their overall
threat exposure.
• Unique reporting capabilities
to help speed vulnerability
identi?cation and remediation.
K ey Components
•Reports help demonstrate compliance with federal,
state, and industry regulations
•Assess an environment from either the external or
internal perspective
•IBM Security expertise improves accuracy of ?ndings
and reduces mitigation time
•Consultation on recommendations for improved
K ey Components
•
•
•
• security
The protection that CyberEdge provides is a valuable additional layer to the most powerful ?rst line of
defense against cyber threats—a company’s own IT system. Constantly monitoring the cyber landscape, we
keep insureds at the forefront of the industry as cyber risks continue to evolve. Our preventative tools provide
our clients with the knowledge, training, security, and consultative solutions to help them stay ahead of the
curve and our breach resolution team provides responsive guidance based on years of experience.
CyberEdge RiskTool
CyberEdge RiskTool, our single, web-based platform,
helps clients streamline the risk management process.
The platform’s content is highly customizable and
can be tailored speci?cally to meet a number of risk
management needs.
Risk management modules include:
• Security: Provides an interface where an IT
department can manage a company’s shunning
technology, which blocks known cyber criminals
from communicating with a company’s network.
• Training: Includes pre-populated training content
and tests with an online assignment engine to
deploy employee training and awareness with the
click of a mouse.
• Compliance: Comes pre-loaded with security
policy templates that can be accepted or modi?ed
to ?t each company’s needs. Existing policies
can also be uploaded and tasked to employees
or third-party vendors to con?rm receipt and
acceptance.
Proactive Shunning Service Powered by
RiskAnalytics
RiskAnalytics provides quali?ed clients with leading
edge intelligence that isolates and shuns bad IP
addresses, preventing them from entering and exiting
a company’s network. With millions of known “bad”
actors constantly updated on the current shun list,
RiskAnalytics’ technology identi?es and blocks the
largest sources for malware, crimeware, and fraud.
RiskAnalytics will provide quali?ed insureds with the
most appropriate cloud services and/or appliance
that best ?ts an insured’s needs and network speeds.
An example of the
AutoShun hardware device.
Responsive Guidance When Needed Most
The CyberEdge Breach Resolution Team is ready to assist insureds as soon
as they suspect a potential network breach. If a breach is suspected to occur,
insureds will be connected with our CyberEdge Breach Resolution Team with
over 15 years’ worth of experience in handling cyber-speci?c claims. Insureds
have access to an IBM supported hotline for IT professionals to consult on
identifying key indicators of a breach. Backed by the strength of our extensive
vendor network, the CyberEdge Breach Resolution Team provides the
additional layer of support an IT department needs to face a cyber attack.
The CyberEdge Breach Resolution Team Provides:
Rapid Support When Needed the Most
• Our team has local presence supported by global resources.
• This structure allows our experts to manage unfolding events and quickly
respond to inquiries.
• Claims specialists have the authority to promptly make decisions and rapidly
assist clients who may have just faced a breach.
Long-Established Expert Vendor Network
• IBM and our expert network of legal ?rms, forensic investigators, public
relations ?rms, and more offer immediate support for our insureds facing a
cyber attack, anytime and anywhere.
• When a breach event occurs, time is of the essence. Having a response plan
in place with access to third-party resources will help you ef?ciently and
cost-effectively respond to and recover from a breach.
Unprecedented Claims Handling Experience
• Since introducing cyber liability insurance in 1999, we have helped
thousands of companies and more than twenty million individuals respond
to a cyber attack.
• The breadth of our claims inventory means that we are uniquely positioned
to identify and anticipate claim trends and settlement values.
• On average, our claims specialists have more than seven years of industry
experience handling the most complex ?rst-party and third-party cyber claims.
Need to Report a Breach?
Call our CyberEdge
Resolution Team at
1-800-CYBR-345
Key Coverage Advantages
Security and privacy liability insurance covers third-party claims
arising from a failure of the insured’s network security or a failure to protect
data. Insurance also responds to regulatory actions in connection with a
security failure, privacy breach, or the failure to disclose a security failure or
privacy breach.
Event management insurance responds to a security failure or privacy
breach by paying costs of noti?cations, public relations, and other services
to assist in managing and mitigating a cyber incident. Forensic investigations,
legal consultations, and identity monitoring costs for victims of a breach are
all included.
Network business interruption responds to a material interruption
of an insured’s business operations caused by a network security failure by
reimbursing for resulting lost income and operating expenses.
Cyber extortion insurance responds to the threat of intentional security
attacks against a company by an outsider attempting to extort money,
securities, or other valuables. This includes monies paid to end the threat
and the cost of an investigation to determine the cause of the threat.
Cyber media insurance addresses the liability faced by companies that
distribute media content via their website. Coverage provided for numerous
perils including copyright infringement, trademark infringement, defamation,
and invasion of privacy.
Claim Bene?ts
• 24/7 access to our call center for claim reporting and guidance now
supported by IBM.
• Single point of entry to report, acknowledge, and process claims in a
timely fashion.
• Access to our local claims specialists on the ground around the world.
• Complimentary one hour consultation with a breach coach and access to
a breach response team to prepare for a cyber attack.
• Access to a panel of domestic and international attorneys with local
expertise in handling cyber claims.
• Access to eRisk Hub, powered by NetDiligence,
®
containing tools and
vendor information to minimize the effects of a breach.
Cyber Risk Travels the World
Through our global service platform Passport, powered by AIG Multinational,
clients are provided an ef?cient and seamless way to stay ahead of the curve
of cyber risk. Add the expertise of our local teams who have the know-how in
the places where you do business. Count on the CyberEdge Breach Resolution
Team for responsive guidance and assistance services that follow the sun. Our
end-to-end risk management solution knows no borders.
Better, Faster, and More Ef?cient Global Protection
Passport is a simple, effective means to far-reaching global advantages,
including:
• Coverage that is admitted locally and in sync with local laws, regulatory
requirements, language, and customs.
• Access to local experts in underwriting, claims, and litigation management.
• Easy to understand coverage, coordinated worldwide.
A Less Complex Way to Address Global Cyber Security Exposure
• Passport makes securing the necessary protection against cyber risk
around the world as simple as possible.
• A client receives one proposal detailing the terms of its global cyber
program, including the worldwide policy and any requested locally
admitted policies.
• The outlined coverage is accepted and it is done.
• Appropriate local policies are issued through our local of?ces around
the world. Local policies are crafted in accordance with local regulations,
industry practices, and exposures.
1
1
Limits are subject to capacity management; certain countries may limit the availability of either a single aggregate or a separate world limit.
Did You Know?
Local laws and regulations sometimes:
• Require that a cyber policy be issued by a locally
licensed carrier.
• Prohibit a local operation from having its parent
company’s policy pay claims directly into that country.
• May not be effectively addressed, or even considered,
in the wording of a global policy.
• Austria
• Australia
• Bahrain
• Belgium
• Brazil
*
• Bulgaria
• Canada
• Chile
• Colombia
• Cyprus
• Czech Republic
• Denmark
• Ecuador
• Finland
• France
• Germany
• Greece
• Hong Kong
• Hungary
• Ireland
• Israel
• Italy
• Japan
• Kuwait
• Lebanon
• Luxemburg
• Malaysia
• Mexico
• Netherlands
• New Zealand
• Norway
• Oman
• Panama
• Philippines
• Poland
• Portugal
• Puerto Rico
• Qatar
• Romania
• Russia
• Singapore
• Slovakia
• Spain
• South Africa
• South Korea
• Sweden
• Switzerland
• Taiwan
• Turkey
• UAE
• United Kingdom
• United States
• Uruguay
Passport for CyberEdge Destinations
* Special handling and additional premium required for Brazil.
New destinations are added constantly, so please check with a Passport representative for more information.
Want to Learn More?
Email us at [email protected] • Visit us at www.aig.com/CyberEdge • Download the CyberEdge Mobile App
Follow CyberEdge Follow @AIGinsurance
www.aig.com/CyberEdge [email protected]
American International Group, Inc. (AIG) is a leading international insurance organization serving customers in more than 130 countries. AIG companies serve commercial,
institutional, and individual customers through one of the most extensive worldwide property-casualty networks of any insurer. In addition, AIG companies are leading providers
of life insurance and retirement services in the United States. AIG common stock is listed on the New York Stock Exchange and the Tokyo Stock Exchange.
Additional information about AIG can be found at www.aig.com | YouTube: www.youtube.com/aig | Twitter: @AIGinsurance | LinkedIn: www.linkedin.com/company/aig
AIG is the marketing name for the worldwide property-casualty, life and retirement, and general insurance operations of American International Group, Inc. For additional
information, please visit our website at www.aig.com. All products and services are written or provided by subsidiaries or af?liates of American International Group, Inc. Products
or services may not be available in all countries, and coverage is subject to actual policy language. Non-insurance products and services may be provided by independent third
parties. Certain property-casualty coverages may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds, and insureds
are therefore not protected by such funds.
© 2014 American International Group, Inc. All rights reserved. 03/14
Apple, the Apple logo, iPhone and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.
Android and Google Play are trademarks of Google Inc.
doc_325302691.pdf