US States Turning To Insurance

Cyber-attacks on government agencies, like the recent event where hackers gained access to Iowa’s State public employee pension accounts, stealing hundreds of thousands of dollars, have become increasingly common.

In response, more US states are purchasing insurance plans specifically tailored to protect the State from potential cyber-attacks.

No Iowa agencies have cyber-attack insurance, but the topic has been discussed among State leaders. “It’s a huge discussion,” said Robert von Wolffradt, Iowa’s chief information officer. Earlier this month, hackers were able to gain access to more than 100 accounts in Iowa’s public employee pension system and steal hundreds of thousands of dollars, according to state officials.Officials do not believe the hackers gained direct access to the State system, but rather obtained identifying information, Social Security numbers and birth dates, for example, through other means and used that to access the system.

The event served as a reminder that government agencies in recent years have increasingly become the target of cyber-attacks.

In 2016, government tied finance as the most-targeted sector for cyber-attacks worldwide, according to an annual global threat intelligence report from Dimension Data, a South Africa-based information technology services company.
When hackers attack a financial institution, they are looking for money. When hackers attack a governmental agency, they are looking for sensitive, and thus valuable, information, experts said. “The biggest threat is the government is the one that has all our data,” said Doug Jacobson, an Iowa State University professor of computer and electrical engineering. “They’re the ones that have all our Social Security numbers, they have our addresses. They have everything about us. That’s the biggest thing (governments) have to try to protect.”Or, von Wolffradt said, hackers are simply “trying to subvert government and just make government look bad.”

In order to protect themselves from cyber-attacks, more states are purchasing cyber insurance.

More than a dozen states have cyber insurance policies, according to a report from the Pew Charitable Trusts “Stateline.”
Cyber insurance policies generally cover costs related to data theft or corruption, the unauthorised sharing of data, and legal costs, according to a report on cyber insurance policies from PNC Financial Services.

Such policies can be expensive. Montana has a $2 million policy that covers all agencies and the state’s public university system; Utah bought a policy in 2015 after a data breach on its health department servers, according to the Pew report.
“It’s expensive. It’s a big budget item for us. But it’s absolutely worth it,” Michael Hussey, Utah’s chief information officer, said in the Pew Report. “You’re seeing breaches now that cost companies and states millions and millions of dollars.”

Would a cyber insurance policy benefit Iowa’s State government agencies? That discussion is taking place, von Wolffradt said. He called it “a very complex issue” that is being considered by the state budget department. Iowa government is currently self-insured, von Wolffradt said. “I think the issue is, if you’re self-insured, how much does this (cyber insurance) cost and how much protection does it afford you and what do you use it for,” von Wolffradt said.

In addition to coming at a high price tag, cyber insurance policies typically require the customer, state government, in this case, have certain levels of protections already in place. “Insurance companies are smart. They’re not going to go into something blind. So they require the agencies to do certain things, have certain protections and certain reasonable responses in place,” von Wolffradt said. “And then that will change the rates that (agencies) are getting charged for insurance.”

Von Wolffradt said he has recommended the state budget department consider a cyber insurance policy.
“We’ve recommended looking at it because we think that as the industry grows, and it’s relatively new, as the insurance matures a little bit, there may be some opportunities there,” von Wolffradt said. Jacobson said Iowa state government has been proactive on cyber security for the past decade.

In December 2015, then-Gov. Terry Branstad issued an executive order for the creation of a state cyber security initiative. A state cyber security strategy was published in July of 2016; Jacobson said other states look to the Iowa plan as a model.
The state also in October opened its new cyber security operations center, which enables state security officials to monitor systems and respond to incidents almost immediately, according to state officials.

The chief information office said it responded to nearly 1,900 incidents in the state budget year that ended June 30. The most common incident is a malware attack that attempts to extract data, von Wolffradt said.

“Everybody’s trying to do the best they can,” Jacobson said. “It’s a rigged game. The attackers only have to be right once, and we have to be perfect. That’s not very fair. But that’s the game we’re being forced to play.”

WCFCourier

You Might Also Read:

More Sensitive US Voter Records Leaked:

Local Government Computer Systems Are Soft Targets:

Georgia - A State Of Cybersecurity:

 

 


 

 

 

« UK Drone ‘pilots’ Must Pass Safety Tests
Cybersecurity Firms Deploy AI Against Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Phosphorous Cybersecurity

Phosphorous Cybersecurity

Phosphorus has fully automated remediation of the two biggest IoT vulnerabilities, out of date firmware and default credentials.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Sabat Group

Sabat Group

Sabat Group provide relationship-driven information security & cyber security recruiting services.

SurePassID

SurePassID

SurePassID is a provider of highly secure, highly extensible multi-factor authentication (MFA) solutions.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

Tenable

Tenable

Organizations around the world rely on Tenable to help them understand and reduce cybersecurity risk across their attack surface—in the cloud or on-premises, from IT to OT and beyond.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.