Cyber Insurance Market Boosting Cyber Security

The insurance industry sits squarely at the intersection of cyber risk management and market solutions. Because the threat is so broad and the world we live in is so interconnected, one common thread throughout the discussions was the need to scale cybersecurity services and the sharing of threat intelligence across all industries.
 

However just hours after Anthem, the second-largest US health insurer, announced it had suffered a massive security breach, the largest Lloyd’s of London insurer said cyber attacks are now too big for private insurance companies to handle. 
Insurance companies have previously pointed out that traditional risks, such as natural catastrophes, are more contained than cyberthreats. Earthquakes in Japan do not cause hurricanes in Florida, the FT noted, but a vulnerability in widely-used software or Internet architecture — both of which are turning up more and more frequently in cyberattacks — can bring down systems globally. That could leave insurers faced with simultaneous multibillion-dollar claims.
While that’s not a completely unfamiliar scenario for both insurance companies and insured businesses — it’s exactly what the Y2K “millennium bug” threatened — the Y2K risk was specific, technically well understood, and had a firm deadline of Dec. 31, 1999. Security vulnerabilities in widely used software are typically unknown until a breach occurs, and attackers frequently hit a few targets at a time, leaving many companies unaware that they too are at risk. In the case of Anthem, for example, the breach came after a series of attacks on smaller health insurance companies.
Some insurers offer cyberattack policies to help companies meet the costs of forensic investigations and lawsuits if they are attacked. But those policies come with high premiums and serious coverage restrictions.
The insurance industry sits squarely at the intersection of cyber risk management and market solutions, and because we have a unique view into the rapidly evolving set of cyber risk.  The insurance industry is well-positioned to drive improved public-private partnerships and should support access to threat information for organizations so they can better protect themselves.  So, as the various stakeholders focus on scaling cyber security measures, it will be important too for the cyber insurance marketplace to continue to scale insurance market solutions and risk management services across the all industries and segments. 
http://blog.willis.com/2015/02/cyber-insurance-market-has-key-role-to-play-in-boosting-cyber-security/

http://www.pymnts.com/news/2015/we-cant-cover-cyberattacks-says-lloyds-of-london-insurer/#.VO8RkEullHh

« Kasperky Identify The ‘Equation Group’
You’ve been hacked. Now what? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Northwave

Northwave

Northwave offers an Intelligent combination of cyber security services to protect your information.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Sera-Brynn

Sera-Brynn

Sera-Brynn is one of the highest-ranked, pure-play cybersecurity compliance and advisory firms in the world.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.