Cybersecurity Incident Highlights Questions about Cyber Insurance Coverage
Time 2 Minute Read

On October 8, 2014, the Department of Homeland Security reported that over the course of several months, the network of a large critical manufacturing company was compromised. According to the ICS-CERT Monitor, the compromised company is a conglomerate that acquired multiple organizations in recent years, resulting in multiple corporate networks being merged. The Department of Homeland Security concluded that these mergers introduced latent weaknesses into the company’s network, allowing hackers to go largely undetected for a significant period of time.

The incident raises some issues for cyber insurance. That the incident occurred over several months suggests that trigger dates for cyber insurance be examined. The reported attack is an example of why certain policyholders should look for policies that cover system intrusions occurring over significant periods of time. Policies limiting their coverage to events occurring during the contractual period (or to a short prior period) can be unduly restrictive. This can be especially important where coverage is sought for Advanced Persistent Threats, where hackers often “footprint” the organization for a considerable period of time before even attempting infiltration.

Further, corporate mergers and acquisitions can complicate not only network security but insurance coverage as well. While merging the networks of different organizations can lead to security weaknesses, it can also lead to coverage gaps. For example, policies that restrict coverage to the networks of a particular insured party may, after a corporate transaction, no longer apply to the corporate network, or the liabilities and losses of a surviving entity. Thus, corporate transactions may be a time not only for evaluating information security risks, but for determining whether existing insurance extends to those exposures.

You May Also Be Interested In

Time 3 Minute Read

Immediately prior to the lapse in funding on October 1, Department of Veterans Affairs (VA) and the Department of Homeland Security (DHS) released information on their contingency plans during the impending government shutdown, providing guidance to federal contractors.

Time 1 Minute Read

Immigration enforcement on colleges and universities is undergoing significant changes.  Higher education institutions must prepare for new challenges that could impact their students and faculty.

Time 5 Minute Read

On January 8, 2025, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency published finalized Security Requirements for Restricted Transactions as designated by the Department of Justice in the DOJ’s final rulemaking, each pursuant to Executive Order 14117 (Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern). The Requirements and DOJ rule will go into effect on April 8, 2025.

Time 2 Minute Read

The New York Department of Financial Services (“NYDFS”) recently cautioned regulated entities to be aware of individuals applying for remote technology-related positions due to an increase in reported threats from North Korea. Threat actors have repeatedly attempted to access company systems and illegally generate revenue for North Korea under the guise of seeking remote Information Technology jobs at U.S. companies.

Search

Subscribe Arrow

Recent Posts

Categories

Tags

Archives

Jump to Page