Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Three ways companies can meet the evolving requirements of the insurance carriers  

admin by admin
Dec 23, 2022
in Cyber Crime
A A
0

Since 2020 ransomware attacks have been on the rise, impacting two-thirds of organizations in the last year, wreaking havoc across industries and increasing the cost of cyber insurance premiums. The spike in ransomware activity, data breaches, and other cyberattacks has impacted cyber insurance carriers that have spent the last few years adjusting underwriting guidelines, increasing prices, and reducing available coverage to offset losses.

Even as the loss ratios of insurance carriers remained flat in 2021, noteworthy incidents such as the Brenntag and Colonial Pipeline ransomware attacks continued to push cyber premiums sky-high. Organizations seeking to renew or refresh their cyber policies in the new year face more stringent eligibility requirements and new exemptions, such as Lloyd’s of London’s exception for certain categories of nation-state attacks.

With the threat of more policy exclusions on the horizon, today’s security leaders are looking for ways to make their organizations more attractive to underwriters. Here are some important steps for companies to take that seek to get the most out of renewed policies:

  • Take care of the cybersecurity basics.

Carriers have increased their expectations for minimum security standards in response to the growing threat of cyberattacks. Underwriters want to ensure the organizations they cover have implemented specific security protocols before considering them for a policy. Generally, they are looking for the implementation of standard security techniques and technologies across an organization, such as multi-factor authentication (MFA) and user behavior analytics (UBA). As party of the  underwriting process, organizations must fully understand their level of preparedness should a breach occur. Carriers want to see organizations taking steps to proactively defend themselves before insuring them.

Security fundamentals are often overlooked, but underwriters look for companies to properly implement basic tactics. A few basics that carriers look for include endpoint detection and response (EDR), firewall usage and effectiveness, encryption and regular backup of business data, and secure provisioning and de-provisioning processes for user access. Without these measures, underwriters may limit an organization’s coverage or deny it altogether.

Each organization possesses a different amount of cyber risk. The factors that make up this level of risk lie at the heart of obtaining cyber insurance. Coverages do not come in one-size-fits-all packages. Each organization gets considered individually based on its likelihood of falling victim to cyber threats.

The carriers correlate the likelihood of a breach to how secure an organization’s network and applications are, in conjunction with how well that organization  equips itself to remediate known vulnerabilities. Factors like endpoint security, patching cadence, and network security are strong predictors of cyber risk.

Cyber risk quantification (CRQ) lets organizations verify cyber insurance adequacy and determine the amount of insurance that sufficiently covers their cyber risk. By quantifying cyber risk, organizations can attach measurable terms to security initiatives and help communicate risk reduction, in addition to better understanding the sort of coverage that works for them. 

Any steps an organization can take to mitigate risk ahead of a carrier’s underwriting assessment will help obtain favorable pricing and coverage, reduce the number of subjectivities required to bind, and avoid immediate declinations.

  • Check the company internally, and all third parties.

A comprehensive review of an organization’s security posture requires more than just an internal assessment. Cyber risk management goes well beyond internal stakeholders. An organization’s security posture consists of the company itself, its partners, and all vendors. Organizations should have a full view of their ecosystem’s risk to pinpoint any weaknesses and prevent any surprises when seeking coverage. Top management doesn’t want the organization to be caught off- guard by a potential security issue tied to an external party.

Organizations should ensure they are proactively monitoring for vulnerabilities among their vendors and have an open line of communication with these organizations. When the company uncovers a third-party risk through proactive monitoring, organizations must communicate and remedy their findings before a breach occurs.

Having complete visibility over assets both inside and outside of an organization will let security teams determine mitigation strategies that will reduce their cyber risk and improve their candidacy for coverage.

While obtaining cyber insurance has grown in complexity, both insurers and the insured are essentially playing the same game. Both parties want to understand and accurately evaluate the level of cyber risk attached to a particular organization. For the insurer, the evaluation process helps to minimize loss and for the insured, it helps to close internal security gaps.

Ultimately, when organizations have insight into their security posture, they are always in a much stronger position to secure a policy that fits the company’s needs and budget.

Andrew Correll, director, insurance solutions, SecurityScorecard

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.