Cyber Risk Insurance Is A Patchwork

The coverage provided for cyber risks by conventional classes of insurance can be patchy, according to research carried out by the International Underwriting Association and law firm Norton Rose Fulbright both based in London.

According to the research, published recently, many insurance buyers believe that existing insurance policies will respond to cyber risks, but there may be gaps in that coverage, noted the report, “Cyber Risks and Insurance: An Introduction to Cross Class Liabilities.”

The effects of a cyber incident can be broad and cause damage to physical property, bodily injury and reputational damage as well as “more obvious types of loss” such as loss of data and business interruption, the report said.

Insurers and insurance buyers need to be aware of the potential for certain risks to be specifically covered, not specifically covered or specifically excluded, the report said.

Stand-alone cyber insurance coverage, extensions and drop-down coverage are being used to enhance the coverage provided by conventional lines of insurance, the report said.

“Professional indemnity and (directors and officers) are two areas where it is possible to envisage situations in which, directly or indirectly, cover is provided for certain types of cyber risk. Yet clients may not be fully aware of the scope in underwriting these lines,” Chris Jones, director of market services at the IUA, said in a statement.

“Conversely, in marine and aviation business, for example, it can be seen that fairly standard policy exclusions may operate to limit the scope of cover in relation to cyber perils,” he said.

“Cyber-specific wordings and products, therefore, may be an effective way of filling gaps of cover which exist in conventional lines of insurance,” he said.

BusinessInsurace: http://bit.ly/20PwREg

« Hidden In Plain Site: Paedophiles Use Facebook Groups
Executive Education: Brown University’s Master In Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.