• Cybersecurity technologies are divided into two levels: Level 1 includes the security technologies required as a foundation for a secure infrastructure, such as the following. * Firewall * Desktop Anti-Virus Tool * Secure Web Gateways * Messaging Security * Intrusion Detection/Prevention Systems * Encryption * Security Event Management Layer 2 security technologies such as those listed below are capable of detecting anomalous behavior in transit and at the host. As a rule, they are bought after a major hack. But before such a loss, more knowledgeable corporations are investing in these advanced technologies that go beyond traditional pattern matching and signatures for known attacks. They are capable of detecting anomalous behavior in transit and at the host. * Network Forensics * Desktop Forensics * Data Leak Protection * Behavioral Analysis * Security Information Channels

  • A cyber-physical attack is a security breach in cyberspace that affects the physical environment. An attacker can gain control over the computing or communication components of water pumps, vehicles, pipe fittings, etc., causing damage to property and endangering lives.

  • Cyber extortion is a type of online crime in which the perpetrator threatens to damage or shut down a company’s website, email server, or computer system, or threatens to reveal electronic data or information belonging to the company unless the company pays the perpetrator a certain ransom amount.

  • Cyberextortion Coverage is an insurance agreement contained in some of the policies written to cover data breach claims. Such policies are most commonly referred to as “cyber security and privacy insurance”, “information security and privacy insurance”, and “cyber security insurance”. This insurance agreement covers costs associated with a cyber-ransomware case (for example, the insured receives an email stating that the ransomware will launch a virus on the insured company’s website unless the company pays a $10 million ransom). The costs covered by this insurance agreement include (1) the money paid to meet extortion claims, (2) the cost of hiring computer security experts to prevent future extortion attempts, and (3) the costs charged by professionals to deal/negotiate with cyber ransomware . Some insurers do not offer cyber-ransomware coverage (also known as “e-commerce ransomware coverage”) because similar protection is available under kidnapping and ransom insurance policies. As with other cyber threat and privacy insurance policies, cyber extortion coverage has an annual cumulative limit and an annual cumulative deductible.

  • Cyber liability is a term used to describe the liability that comes with communicating or doing business online. Potential engagements include the Internet and email. Online communication tools can lead to claims for alleged violations of privacy rights, infringement or misappropriation of intellectual property, discrimination in employment, violations of obscenity laws, distribution of computer viruses and defamation. Media liability policies are available to cover these impacts.

  • The Construction Risk and Insurance Specialist (CRIS®) is an insurance certification program consisting of a series of courses focused on the insurance and risk management needs of construction projects and contractors. Individuals who complete the program are eligible to demonstrate a CRIS certificate to demonstrate their knowledge of construction insurance and risk management, as well as their commitment to the construction industry. CRIS courses are approved for Insurance Agent or Broker Continuing Education (CE) Credit and Certified Public Accountant (CPA) Continuing Education Credit in most states. The CRIS program is administered by the International Institute for Risk Management, Inc. and is available online at CRIS <>.