Crisis Management

With the diverse range of security risks that businesses and their workforce face globally in an increasingly litigious society, it’s becoming more critical now than ever to have a robust and holistic security risk and crisis management strategy in place.

There is also an increasing need for companies to have expert resources available to call upon when required.

A crisis incident involves multiple stakeholders: the victim, victim’s family, the company including shareholders, directors, employees and the media.

The ability to manage an emergency situation anywhere in the world, whilst also trying to manage the various parties involved is a critical skill. Having a security risks policy in place which underpins a company or family’s crisis handling protocols will streamline this process and provide immediate professional response support from start to finish.

WHAT WE DO

crisis management

We can support your business in identifying their security concerns and creating bespoke insurance solutions, ensuring that their policy wording, insurer and response consultant are best-suited for your needs.

And when the worst happens and a claim arises, we’re there every step of the way in advising you on the best course of action, assisting with information gathering and negotiating with the insurer to obtain the best possible claims settlement, by leveraging our superior product knowledge, insurer relationships and claims experience.

crisis management

Part of our role will also be supporting you in implementing pre-incident preventative measures through training and security reviews to help mitigate the risk, all of which can be part-funded by a proportion of your insurance premium.

Key Stats

20+ global security risk specialists
25 years’ broking and claims experience
Over 900 security risks claims handled
Only global credit and political broker with an in-house security team

WHY JLT

Clients wishing to purchase insurance for security risks need to ensure that they select a broker with the relevant skills, knowledge and expertise in their business sector. We believe insurance contributes to the growth of your business as well as providing crucial protection in challenging circumstances.

We find opportunities, where others see challenges. Our entrepreneurial culture and exclusive analytical ability helps clients to identify and realise opportunity in volatility. Here’s what makes us different:

  • We pride ourselves on being accessible across all time zones. By the very nature of these insurances, we understand the great time-sensitivities involved
  • Given the sensitivity and complexity for security-related claims, we advocate integrity, efficiency and confidentiality
  • We have the tenacity and desire to disrupt the market status quo and drive the insurance market forward with cutting-edge solutions. We pride ourselves in being seen as market leaders
  • We have a dedicated team of specialists around the world, focused solely on security risks, so you know you will always receive expert advice and support
  • Our long-standing relationships with the specialist insurers in this field means that our market leverage for seeking alternative structures to ensure the most competitive and holistic coverage is available to you. We set the trends, not just follow them
  • Our proprietary risk platforms and knowledge hubs are unique to the insurance market and can deliver you with critical risk insights
  • Our brokers draw on our in-house analysts’ expertise to identify current risk trends and forecasted risk developments globally that may impact you or your business.

Case Examples

CYBER COMPROMISE

Scenario: Following a software update on one of the control systems at a power plant, the company noticed a lack of connectivity between sites in the region and a reduced power output.

Policy response: Cyber security consultants, who are available 24/7 to respond to emergencies any day of the year, were contacted and a cyber investigation was launched both remotely and at site. The investigation uncovered a malware on the system allowing the hackers access to data on power generation and output and importantly an ability to control some of the systems at the plant. The consultants hand held the crisis management team and delivered a vulnerability assessment, advising on measures to isolate the incident and prevent further attacks.

ILLEGAL SEIZURE

Scenario: A multinational engineering company had a shipment of machinery seized by officials at a port in South Asia. Financial demands were made and criminal sanctions threatened.

Response: Investigative consultants’ contracted under the insurance policy were deployed from the relevant offices to establish facts and factors. Investigation of actors took place to see if they had made similar demands in the past. Enquiries made at regional and federal levels to see if authorities were connected with seizure. Security consultant deployed to advise on how to resist payment demands and ensure physical safety of crew/staff and integrity of shipment. Site was able to remain open and employees and investors were reassured that the site was safe and secure due to temporary security detail. As a result of these measures, the risk of further threats against the company was significantly diminished and the company’s operational resilience was significantly improved.

Insurance solutions

Key risks your business or employees may encounter include:

  • Confiscation: wholesale seizure/expropriation of the insured’s property, outside of where the insured’s HQ is located, by legal government authorities without justification or where such justifications are false
  • Deprivation: denial of access to the insured’s property, located outside of where the insured’s HQ is located, by legal government authorities without justification or where such justifications are false.
  • Civil unrest: a substantial disturbance of public peace by a group of persons acting with common intent that causes actual physical damage to the insured’s property, or bodily injury/death to an insured person or prevents the insured from accessing/exiting their property
  • Malicious damage: loss, damage or destruction to the insured’s property caused by anyone intending to cause harm or mischief committed for political, religious, ideological, revenge or similar purposes or solely and directly targeting the insured/insured person
  • Riots: a violent disturbance by a group of persons who threatens the public peace
  • Sabotage: actual or attempted damage, disruption or subversion of the insured’s operations by persons who are targeting specifically the insured’s physical property for the purpose of creating unfavourable publicity, delays in production, physical property damage, destruction of working relationships or harming employees/customers
  • War: declared or undeclared hostile action between two or more nations or states.
  • Cyber compromise: illegal breach of your information technology networks/computer systems by persons intending to steal, alter, damage or delay, prevent access to information contained on the insured’s network/computer system
  • Cyber threat: illegal threats against the insured to publish proprietary information, damage property/electronic property, divulge trade secrets or introduce malware on to the insured’s computer systems
  • Industrial espionage: attempted or actual taking of the insured’s proprietary information without the insured’s permission with the intention of revealing such information to a competitor or foreign government.
  • Environmental disaster: sudden discharge or escape of pollutants into land or structures, the atmosphere or any watercourse by the insured or in/at premises of the insured
  • Man-made disaster: human actions/omissions that are the principle cause for disastrous events that damage the insured’s property or could cause bodily harm/death or could cause business interruption to the insured’s business
  • Epidemic: human-human transmission of an influenza virus able to sustain community-level outbreaks
  • Natural disaster: any natural occurrence e.g. earthquake, volcanic eruption, tsunami, snow, rain, hail, flood, wildfire, hurricane etc.
  • Assault: acts resulting in immediate serious physical bodily injury of an insured person through use of a weapon
  • Murder: unlawful killing of an insured person
  • Stalking: unwanted or obsessive attention by an individual/group toward an insured person that directly/indirectly communicates a threat or places the insured person in fear
  • Product tampering: alteration or contamination of the insured’s products by a person who intentionally, wrongfully and maliciously renders the insured’s products dangerous for its intended use or consumption
  • Workplace violence: aggression, physical assault or threatening behaviour that occurs on the insured’s property and involves use of a lethal weapon and causes physical or emotional harm to an insured person
  • Criminal facilitation: an insured person acting with knowledge that another person is committing or intends to commit a crime against the insured’s property.
  • Blackmail: a ransom demand made against an insured person in return for not revealing compromising or injurious information
  • Detention: the illegal holding under duress of person(s), whether conducted by legal government authorities or a criminal group
  • Kidnap: the illegal taking of an insured person and holding captive by persons who demand a ransom from the insured’s assets as a condition of release
  • Product extortion: a malicious threat to the insured or the production of publicity that the insured’s products will be damaged, polluted, contaminated or rendered substandard with a ransom demand as a condition of not carrying out such threats or before providing further information about the affected products
  • Hijack: illegal taking of a vehicle, train, vessel or aircraft transporting insured persons by an opposing party who demand that a set of specified terms are met as a condition of release.
  • Cargo tampering: actual/attempted intentional malicious alteration or contamination of cargo while under your care, custody and control
  • Smuggling: unauthorised use of a vessel to transport contraband without your knowledge
  • Vessel assault: use of firearms against a vessel for the purpose of diverting/seizing/damaging the vessel
  • Vessel cyber breach: unauthorised acquisition, access or loss of data located on electronic systems aboard a vessel
  • Malicious seizure: the holding of your vessel by legal government authorities without justification.

Where your in-house security team may need additional resource and capacity to deal with such risks and threats, there is a unique insurance security solution now available which delivers bench strength to your existing in-house capabilities via unlimited access to a market-leading security company’s analytical, investigative and response teams. With a cost-effective, one-off annual premium, you will have access to 40 expert teams globally enabling greater business resilience.

Uniquely this insurance product can be triggered not only on occurrence of an insured event but also ‘on suspicion of or on imminent threat’ of an insured event.

CPS ANALYTICS

Our starting point when structuring a new policy is to precisely understand your needs. Our brokers sit alongside a team of risk analysts drawn from security, technical and academic backgrounds.

Their substantial knowledge is utilised to help us understand the precise nature of your risk profile, thereby assisting us in determining the right insurance solution for your requirements.

Using ground-breaking modelling and rating tools, such as Sunstone and World Risk Review, our analysts can pinpoint risks, map exposures, analyse the risk triggers, and evaluate probable maximum loss (PML) ratios across a portfolio of assets.

Read our latest insights Read our  latest insights