Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Laws & Regulations

EIOPA Supervisory Statement On The Management Of Non-affirmative Cyber Exposures – Insurance Laws and Products

admin by admin
Dec 20, 2022
in Cyber Laws & Regulations
0 0
A A
0
FacebookTwitterLinkedIn

19 December 2022


William Fry



To print this article, all you need is to be registered or login on Mondaq.com.

In early August 2022, the European Insurance and Occupational
Pensions Authority (EIOPA) published a draft
supervisory statement on non-affirmative cyber risks and held a
public consultation on the draft statement. In late September 2022,
EIOPA published a feedback statement summarising the main
findings of the consultation and a resolution of comments paper outlining the
individual comments they received and their responses to the
comments. The supervisory statement is now in final
form.

The statement deals with potential cyber-related losses through
insurance policies where cyber coverage is neither explicitly
included nor excluded, i.e. non-affirmative coverage. With economic
and financial activities becoming more digitalised in recent years,
the frequency and sophistication of cyber incidents in the
financial sector have increased significantly. As underwriters in
the cyber market will be well aware, incidents such as the NotPetya
attack in 2017 can lead to significant systemic risk and unexpected
losses. These incidents often lead to time-consuming, expensive,
and unpredictable litigation.

Recommendations

Against this backdrop, EIOPA recommended that national competent
authorities (NCAs) (such as the Central Bank of
Ireland (CBI)) must pay greater attention to
insurance undertakings’ assessment of the terms and conditions
of their existing insurance products covering cyber risks.
Particular attention is required for undertakings with significant
exposures and those without plans to identify risks. Greater
engagement between NCAs and insurance undertakings is needed.

Strategy and Risk Appetite

NCAs should ensure that cyber underwriting is a primary aspect
of an undertaking’s overall strategy and that the undertaking
considers its risk appetite for cyber underwriting. The strategy
should factor in non-affirmative cyber components and define
inclusions or exclusions related to cyber risks. Undertakings must
align, monitor, and regularly adjust pricing and capital
consideration regarding the overall cyber risk exposure to ensure
compliance with the undertaking’s risk appetite.

Identification of Risk Exposure

Undertakings should identify their risk exposure around
non-affirmative cyber risk to implement sound cyber underwriting
practices. When determining their exposure, EIOPA recommends that
undertakings:

  • Measure exposure.

  • Clarify coverage.

  • Define cyber terminology.

  • Monitor exposure.

EIOPA notes that the outcome of this review should lead to terms
and conditions that are clear, simple and aligned with the
undertaking’s overall strategy and cyber risk appetite while
also providing value for money to policyholders in line with the
target market.

Risk Management

The statement notes that (re)insurance undertakings must develop
a comprehensive understanding of potential non-affirmative cyber
insurance risk scenarios and manage their respective exposure,
taking into account concentration and accumulation risk. EIOPA
recommends that undertakings regularly evaluate and make use of
available reinsurance capacity to mitigate risk related to cyber
threats and ensure that overall solvency requirements are adhered
to.

War and Terrorism Exclusions

EIOPA notes that undertakings should devote particular attention
to traditional war and terrorism exclusions that may not take into
account the digital aspects of modern warfare and, therefore, might
lead to ambiguity regarding coverage.

Central Bank of Ireland

The CBI has previously cautioned undertakings about silent
cyber- where policy wording fails to exclude cyber risks. These
risks could potentially leave insurers open to claims from
customers who suffer cyber-attacks which insurers have not provided
for financially. It would be akin to the business interruption
claims made against insurers by businesses shut by the pandemic,
which the industry had failed to anticipate.

Covid-19 highlighted weaknesses with ambiguous wording in some
policies where risk exposures had not been adequately priced and
reserved for by some undertakings. The CBI recommended that firms
conduct periodic reviews of policy terms, limits and exclusions to
ensure their product offerings are structured to respond in the
manner intended, are within their risk appetite and are adequately
priced.

In light of this supervisory statement (which echoes the
sentiment of the CBI warnings), Irish authorised (re)insurance
undertakings should expect an increasing supervisory focus from the
CBI.

Conclusion

EIOPA’s supervisory statement promotes supervisory
convergence in how NCAs address cyber risks. The statement
addresses the need for a top-down strategy and risk appetite
considerations for (re)insurance undertakings underwriting or
wishing to underwrite cyber risk. It also reflects the need for a
review of policies for cyber coverage and the need to communicate
such a review to undertakings in a clear and timely manner.

Contributed by Rory Carbery

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Insurance from Ireland

Schrödinger’s Fact

Deka Chambers

This article is co-written by Jack Harding of Deka Chambers and Michael Hagan of Fletchers Solicitors.

Life Insurance In Cyprus

AGP Law Firm | A.G. Paphitis & Co. LLC

Life insurance is a contract between an insurance policy holder and an insurance company, in which the insured agrees to pay a life insurance premium (amount of money paid to the life insurance company) and in return…

Sigorta Tahkim Komisyonuna Başvurudan Önce Arabuluculuk Müessesesi

K | N Kucukislamoglu Narin & Partners

14.06.2007 tarih ve 26552 sayılı Resmi Gazetede yayımlanarak yürürlüğe giren 5684 sayılı Sigortacılık Kanunu (SK)’nun Amaç ve Kapsam baÅŸlıklı 1. Maddesine göre “ülkemiz sigortacılığının geliÅŸtirilmesini saÄŸlamak, …

Supporting Innovation In Insurtech

Norton Rose Fulbright

It was fantastic to be talking about Norton Rose Fulbright’s annual Insurathon pitch competition last night, at a sell-out Instech event.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Hub Security Announced the Fulfillment of All Conditions Precedent for the Upcoming $1.28 Billion Merger Transaction
Cyber Laws & Regulations

HUB Cyber Security – Updates on Nasdaq Listing and Pipe Investor Change

Why are Company Ransomware Payments Dropping Dramatically? | Kohrman Jackson & Krantz LLP
Cyber Laws & Regulations

Why are Company Ransomware Payments Dropping Dramatically? | Kohrman Jackson & Krantz LLP

EIOPA Supervisory Statement On The Management Of Non-affirmative Cyber Exposures – Insurance Laws and Products
Cyber Laws & Regulations

Ethics & Compliance: Let’s Talk About Cybersecurity – Security

UK Cyber-Crime Agencies Probing Suspected Royal Mail Attack (1)
Cyber Laws & Regulations

Bankman-Fried Wins Texas Ruling as States Go After Lost Funds

Meeting the AI moment: advancing the future through responsible AI
Cyber Laws & Regulations

Meeting the AI moment: advancing the future through responsible AI

NHRC Chief Seeks Stringent Law To Deal With Unlawful Internet Behaviour, Cybercrime
Cyber Laws & Regulations

NHRC Chief Seeks Stringent Law To Deal With Unlawful Internet Behaviour, Cybercrime

Why are Pennsylvania cyber charter schools allowed to have large fund balances?
Cyber Laws & Regulations

Why are Pennsylvania cyber charter schools allowed to have large fund balances?

Gain Control of Business Data to Reduce Costs, Increase Productivity, Inform Decisions, and Improve Security
Cyber Laws & Regulations

Gain Control of Business Data to Reduce Costs, Increase Productivity, Inform Decisions, and Improve Security

SEC suit ‘charts a perilous new course,’ hacked law firm says
Cyber Laws & Regulations

SEC suit ‘charts a perilous new course,’ hacked law firm says

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Understanding the Implications & Guarding Privacy- Axios Security Group

Understanding the Implications & Guarding Privacy- Axios Security Group

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.