CIOApplications
  • Home
  • Applications
      • 3D Scanning
      • Bioinformatics
      • Blockchain
      • BPM
      • Business Continuity
      • Business Intelligence
      • Collaboration
      • Configuration Management
      • CPQ
      • Container Management
      • CEM
      • Data Platform
      • Data Preparation
      • DMS
      • e-Discovery
      • Employee Engagement
      • EAM
      • Enterprise Communications
      • Enterprise Mobility
      • ERP
      • GIS
      • GRC
      • Human Resource
      • Innovation Management
      • Inventory Management
      • IT Infrastructure
      • IT Service Management
      • IT Services
      • Low Code
      • Managed IT Services
      • Marketing
      • Master Data Management
      • Mobile Application
      • Portal Software
      • Procurement
      • Project Management
      • Remote Monitoring
      • Remote Support
      • Sales
      • Software Asset Management
      • Software Testing
      • Supply Chain
      • Task Management
      • Unified Communications
      • Voice Recognition
      • Workflow
  • Verticals
      • Aerospace & Defense
      • Automotive
      • Banking
      • BioTechnology
      • Casino
      • Construction
      • Contact Center
      • E-commerce
      • Education
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Insurance
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Media and Entertainment
      • Oil & Gas
      • Retail
      • Space Tech
      • Telecom
      • Travel and Hospitality
      • Utilities
  • Technologies
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Big Data
      • Chatbot
      • Cloud
      • Content Delivery Network
      • Cyber Security
      • Data Center
      • DevOps
      • Distributed Technology
      • Drone
      • Enterprise Architecture
      • Enterprise Search
      • Enterprise Startups
      • Graphics
      • HPC
      • IoT
      • Java
      • Load Balancing
      • Machine Learning
      • Machine to Machine
      • Machine Vision and Imaging
      • Nano Tech
      • Predictive Analytics
      • Robotic Process Automation
      • Robotics
      • Security
      • Telematics
      • Testing
      • Video Surveillance
      • Virtual Assistant
      • Wireless
  • Partner Network
      • Adobe
      • Amazon
      • Avaya
      • ESRI Partner
      • IBM
      • Infor Solutions
      • Microsoft
      • Mitel Partners
      • National Instruments
      • NetSuite
      • Nintex
      • Oracle
      • Progress
      • Riverbed
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
  • News
  • conferences
  • Newsletter
  • About us
×
news

Subscribe to our Newsletter

Become a member of our mailing list for the latest articles, news, and exclusive insights.

news
news

Enter Your Email Address:

Thank you for subscribing with us. We sent you an email regarding this.

loading
SUBSCRIBE
  • Home
  • Cyber Security
Editor's Pick (1 - 4 of 8)
left
Augmenting Cybersecurity in Healthcare Industry

Augmenting Cybersecurity in Healthcare Industry
Robert Napoli, CIO, Planned Parenthood of the Great Northwest and the Hawaiian Islands

3 Steps To Elevating  Corporate Security

3 Steps To Elevating Corporate Security
Mark Kelly, CIO, VP-IT & Services, Curvature

Security Solutions for Cyber Risk Mitigation

Security Solutions for Cyber Risk Mitigation
Colin Black, CIO, Crowd Strike

INSIDE or OUTSIDE Where's the Bigger Threat?

INSIDE or OUTSIDE Where's the Bigger Threat?
Balaji Ramanujam, CIO and SVP for Products, ASI Government

The Tao of Cyber Security in today's reality

The Tao of Cyber Security in today's reality
Marc DeNarie, CIO, NaturEner USA & Canada

New Defensive Measures against HACKERS Efficiencies

New Defensive Measures against HACKERS Efficiencies
Dawn Roth Lindell, CIO, Western Area Power Administration

Preventing Cyber-Attacks in Universities with Operational Collaboration

Preventing Cyber-Attacks in Universities with Operational...
Michael Corn, Deputy CIO & CISO, Brandeis University

Addressing Cyber Security Strategically

Addressing Cyber Security Strategically
David L Stevens, CIO, Maricopa County

right

De-Mystifying Cyber Insurance

By Jeffrey Batt, Vice President, Marsh

Tweet
content-image

Jeffrey Batt, Vice President, Marsh

De-Mystifying Cyber Insurance

In our increasingly automated and digitally-reliant economy, cyber insurance is a necessary tool to mitigate the financial impact of a data breach or other damaging cyber events. Year over year, more companies are buying cyber insurance; out of 1,300 large and medium-sized U.S. companies polled in a recent survey conducted by Microsoft and Marsh, 34% currently purchase and another 22% plan on doing so in the next 12 months. Yet, despite this fact, cyber insurance remains frequently misunderstood in connection with what it covers, pricing, and how it functions in connection with a company’s broader cybersecurity strategy and controls—but it doesn’t have to be. So, with that in mind, the following is intended to provide more clarity about how cyber insurance can be a good fit if your company doesn’t already purchase it:

• Perception: “if I buy cyber insurance, I can lower my guard or decrease my investment in technical or other cyber risk mitigation controls” (i.e., the people/process/ technology solutions you have in place to shore up your risk protection).

• Reality: cyber insurance is meant to augment, not replace, your risk mitigation controls. Think of it as a financial backstop that limits the scope of loss and helps your organization quickly get back to normal business operations in the wake of a serious cyber incident.
To use an analogy, companies invest in smoke detectors and practice fire drills to limit the possibility of property damage, but they also purchase fire insurance. In a similar way, cyber insurance is a key part of your organizational cybersecurity in that it increases your cyber resiliency.

• Perception: “cyber insurance seems to be increasingly expensive, and I’m concerned about underwriters accurately pricing my risk.”

• Reality: although still “young” compared to more established insurance lines, the cyber insurance market has grown exponentially over the last decade. Based on increased market capacity, greater underwriting experience and knowledge, more claims data, and improved quantification and risk modeling tools (among other factors), cyber insurance pricing for most industries has remained largely flat or only increased incrementally over the past two years. In fact, from Q1 to Q3 2017, there was a net decrease in pricing across all industries before picking up slightly in Q4.

•Perception: “I’m not sure that a cyber insurance policy covers the range of potential vulnerabilities that my organization is facing.”

•Reality: cyber insurance is only an effective risk transfer tool if it keeps pace with the changing threat environment. In other words, it’s a good thing that policy language and coverage evolve from year to year, as that means that insurance carriers and brokers are ensuring that the product remains aligned with the risk. For example, coverage for contingent business interruption (for cyber losses incurred by a third-party services provider that your organization relies on) was either not offered or only offered partially for extra cost as recently as three years ago. Now, many go-to cyber insurance markets include it as a standard coverage at full limits for no additional cost.

Perhaps the biggest misconception about cyber insurance, however, is that it’s an issue that should be siloed within the risk management domain. To the contrary, corporate officers are increasingly engaged in cyber risk-related discussions and as the organization’s information and business leader, the CIO is uniquely situated to contribute to and shape these conversations. This is true for both internal deliberations on whether to purchase the insurance, as a component of an overall cyber risk management strategy, and for subsequent external conversations with insurance markets, where the CIO or CISO is often responsible for conveying their organization’s information practices and security controls.

Read Also

The Tao of Cyber Security in today's reality

The Tao of Cyber Security in today's reality

Marc DeNarie, CIO, NaturEner USA & Canada
New Defensive Measures against HACKERS Efficiencies

New Defensive Measures against HACKERS Efficiencies

Dawn Roth Lindell, CIO, Western Area Power Administration
Preventing Cyber-Attacks in Universities with Operational Collaboration

Preventing Cyber-Attacks in Universities with Operational Collaboration

Michael Corn, Deputy CIO & CISO, Brandeis University
Addressing Cyber Security Strategically

Addressing Cyber Security Strategically

David L Stevens, CIO, Maricopa County

Cyber Security Special

  • Integrity Security Services: Embedded IoT Security and Management
  • ProStar Solutions: New Age Cyber Security and Hosted Solutions

Featured Vendors

  • INTEGRITY Security Services: Embedded Iot Security and Management
    INTEGRITY Security Services: Embedded Iot Security and Management
  • 3i International: Ingenious Cyber Security Solutions
    3i International: Ingenious Cyber Security Solutions
  • Absolute: Self-healing Endpoint Security
    Absolute: Self-healing Endpoint Security
  • Axiad IDS: Preventing Cybersecurity Threats with Axiad ID Cloud
    Axiad IDS: Preventing Cybersecurity Threats with Axiad ID Cloud

Copyright © 2019 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://cyber-security.cioapplications.com/cxoinsights/demystifying-cyber-insurance-nid-1839.html