Risk & Business Magazine Sterling Insurance Fall 2017 | Page 27

CYBER COVERAGE BY: BRANDON HORROCKS STERLING INSURANCE T The Value Of Cyber Coverage For Manufacturing he world, like it or not, is becoming more and more connected every day. With an increasing need for products and services, many of which will end up halfway around the world, it is understandable that manufacturing facilities have a need to constantly stay on their toes when it comes to technology. This means keeping equipment connected, networked, and up-to-date. Automation and the increasing adoption of novel efficiency and productivity methods are being utilized to help improve margins and bring down overhead. The unfortunate side effect of that interconnectivity is that operations can be derailed much more easily than ever before, which could result in huge financial losses for companies. Protecting business income should be a key strategy. The manufacturing process typically has three key points where a cyber-attack could disrupt operations: • Management Workflow – What would happen if the management workflow were to be disrupted? • Manufacturing – The control systems managing the manufacturing process • Logistics – Vendor-driven systems for handling distribution processes and deliveries With so many systems working together, and the necessity of streamlining and efficiency in modern manufacturing processes, it wouldn’t take much to derail an entire operation and shut a plant down. So if you were looking at a cyber policy to alleviate some of the potential risk that your manufacturing business may face, what key elements would be included? • Third-Party Liability and Regulatory Coverage – A majority of claims are likely to stem from third parties who may have been affected by a cyber breach. • Crisis Response – Helps to cover losses due to business interruption resulting from the attack • Hardware and Software Restoration – Replaces hardware affected by the event and provides funding for overtime or contract staff who can repair or restore lost data or software • Broad Triggers – A cyber event can take place not only due to malicious attacks on the part of hackers but also due to mistakes in internal systems, such as programming errors. With broad triggers, you can extend that traditional attack coverage to include management mistakes and even vendors. Efficiently writing a policy, however, comes down to the amount of key information you can provide to your insurance professionals. They need to know what sorts of control systems you use; any supply chain details, third party trade secrets, and confidential information you may hold; and financial information about your facility (specifically, how it might be affected in the event of a shutdown). Unfortunately, not all cyber policies are created equally, and the vast majority of cyber policies are not designed to address manufacturing risks. + Brandon Horrocks joined Sterling Insurance Group in 2013 and brought with him 20 years of knowledge and in experience in the Commercial & Benefits arenas. Brandon makes your business his business and is well versed in helping his clients reduce their risk & liability during the Merger & Acquisition process. Contact Brandon at bhorrocks@ sterlingagency.com or (586) 685-0125. 27