Cyber Insurance Has Distinctly Risky Characteristics

Although cyber risk premiums have expanded sizably in recent years with loss ratios that compare favorably to other product lines, the danger of accumulation risks is a key concern for the market, according to a study released by insurance industry think tank The Geneva Association.

The study, titled “Advancing Accumulation Risk Management in Cyber Insurance,” identifies three prerequisites to a sustainable cyber insurance market:

• Customers and insurers must facilitate resilience at the source of risk for the principles of insurability to apply.

• Insurers must be able to achieve an acceptable return on capital.

• Insurance markets need to be able to withstand shocks from extreme events, which means absorbing accumulation risk.

The concern about accumulation risk is widely held across the industry and is the reason the Geneva Association report is focusing on the market’s ability to withstand extreme events, said Anna Maria D’Hulster, secretary general of The Geneva Association (GA), in a forward to the report.

“Expanding the boundaries of insurability is not new for insurers. However, cyber risks are taking us into uncharted territory,” she added. “Both exposures and threats have distinct characteristics, which give rise to unprecedented challenges.”

“These challenges require that insurers strengthen their core underwriting capabilities, in particular exposure measurement, claims assessment, and accumulation modelling,” the study said.

The report went on to highlight four cyber accumulation risk challenges:

• A single large event or a series of consecutive events may make affirmative cyber insurance unprofitable. (The report explained that insurers provide affirmative coverage in standalone and package policies).

• Insurers and reinsurers (for which risk accumulation may be more pronounced than for primary insurers) could underestimate non-affirmative cyber exposure leading to an unplanned shock from a major event. The report explained that non-affirmative cyber exposure occurs when a cyber attack causes major losses by triggering coverages in other classes. [Editor’s note: Insurers face non-affirmative, or silent cyber exposures, when they offer all-risk policies and other liability insurance policies that have not excluded cyber risks.]

• Data are of insufficient quality, are incomplete and/or lack the necessary consistency for more advanced modeling techniques.

• Governments predominantly fail to provide frameworks for the sharing of large-scale cyber-terrorism-induced losses.

Market Consequences

The study said there are many market consequences if risks from these challenges materialize.

“Insurers and reinsurers could withdraw from the market after unacceptably high losses and fear of repeat events,” the study continued, noting that such losses also could stall the growth of the small alternative capital market and prevent insurers from accessing needed capacity.

In addition, re/insurers could introduce tighter policy terms and increase the number of exclusions and/or make buy-backs prohibitively expensive, the GA study said.

“The lack of confidence in advanced model outputs could stifle growth if models are deemed to be too blunt for insurers to extend portfolios or offer higher coverage levels,” which could result in a further constraint on the amount of coverage available for larger enterprises and leave the market for small and medium enterprises underdeveloped.

“A large event may also trigger regulatory intervention with the risk for insurers having to provide cover with uneconomic terms and rates,” GA said.

In response, GA said, insurers have formulated several approaches:

• Developing data analytics that analyze the characteristics of cyber risk as well as data protocols that combine company infor­mation with digital risk indicators.

• Novel approaches to analyzing the risk “footprint” and corresponding threats affecting the size of the footprint. For example, the mathematics of epidemiology could be applied to the spread of computer viruses.

• Forward-looking threat assessments including external expert inputs, while developing in-house technical know-how.

• Mapping cloud-related interconnectivity and digital supply chains, and using machine learning to assess the relationship between claims frequency and multi-dimension exposure.

• “Of equal importance is the need to maintain underwriting discipline. Cyber risk is not unique in this respect. Historically, many property-casualty classes have suffered when underwriting standards slipped or when prices failed to adequately reflect the cost of risk,” the study went on to say.

“Many insurers perceive the current rating environment as soft and likely inadequate should any of the above risks materialize,” the study added. “Furthermore, the growing threat from terrorism adds urgency to such concerns, and the appropriate treatment for this risk in war and terrorism exclusions will be key.”

Cyber Models

Accumulation modeling supports a greater understanding of risk interconnectivity, whether on a wide scale or within specific industry segments, which improves the ability of underwriters to accept risk, the study affirmed.

Market development is likely to continue to benefit from modeling advances, said the report, expressing cautious optimism that as long as underwriting discipline is maintained “insurers are well-positioned to ensure the cyber insurance market’s viability and achieve sustainable growth in the future.”

“Cyber risk has distinct characteristics. Exposure bases are hard to define and measure. Historical claims data are scarce and not good predictors. Threats are constantly evolving, can spread widely and rapidly, and a series of consecutive large events is plausible. Moreover, a high degree of interconnectivity may result in potentially boundless impacts,” said Daniel Hofmann, senior adviser Insurance Economics at The Geneva Association and primary author of the study, in a statement.

Insurance Journal:

You Might Also Read:

Insurers Are Not Ready For IoT

« Catching The Silent Attacker, And The Next Phase Of Cyber AI
NATO Live-Fire Cyber Exercise »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

CodeOne

CodeOne

CodeOne provides solutions for website and web app security.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).