Posts Tagged ‘Cyber Insurance’

Buying Cyber Insurance Gets Trickier as Attacks Proliferate, Costs Rise

Security chiefs should shop early for coverage and prepare for long questionnaires about their companies’ cyber defenses, industry professionals say For many businesses, obtaining or renewing cyber insurance has become expensive and arduous. The price of cyber insurance has soared in the past year amid a rise in ransomware hacks and other cyberattacks. Given these […]

Leave a Comment

Cyber Insurance and the Changing Global Risk Environment

When security fails, cyber insurance can become crucial for ensuring continuity. Cyber has changed everything around us – even the way we tackle geopolitical crisis and conflicts. WhenEinstein was asked what a war will look like in the future, he couldn’t have predicted the importance ofdigital technology for modern societies. According to a report by IDC, […]

Leave a Comment

Significance of risk management in cyber insurance to determine premium

By DISC InfoSec The limited availability of data on cyber incidents has made it difficult to develop full probabilistic models for use in pricing cyber insurance cover. While a few insurance companies, brokers and other companies have developed pricing models that provide quantifiable probabilistic estimates of potential losses based on Fair methodology, the vast majority […]

Leave a Comment

Cyberlaw wonks squint at NotPetya insurance smackdown: Should ‘war exclusion’ clauses apply to network hacks?

Are war exclusion clauses fit for purpose under International Humanitarian Law as cyber-attacks? When UK and US said it was Russia, they weren’t thinking of the litigators! Among the victims was US food giant Mondelez – the parent firm of Oreo cookies and Cadburys chocolate – which is now suing insurance company Zurich American for […]

Leave a Comment

Cyber Insurance – an essential part of risk mitigation strategy?

By Foundstone Services Advancement of technology is deriving proliferation of threat landscape rapidly which extend attack vectors. With proliferation of automated tools available for cyber criminals; it’s not a matter of “if” but “when” there will be a security breach. There are two types of organizations in this category, those who’ve been hacked, and those […]

Comments (1)

Cyber Resilience Best Practices

RESILIA™ Cyber Resilience Best Practices AXELOS’s new guide RESILIA™ Cyber Resilience Best Practices provides a methodology for detecting and recovering from cyber security incidents using the ITIL lifecycle RESILIA™ Cyber Resilience Best Practices Best guide on Cyber Resilience on the web – Cyber Resilience Best Practices is part of the AXELOS RESILIA™ portfolio. RESILIA™ Cyber Resilience […]

Leave a Comment