Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance market holds the promise of unlocking the potential for meaningful coverage for both insurers and buyers. That is according to a new report by JLT Re and JLT Specialty Limited.

According to the report released at the 2017 annual Risk Management RIMS Conference, buyers are clamoring for better cyber products to address the growing and complex risks of cyber, while underwriters are being cautious over concerns around “unquantified cyber exposures potentially buried in traditional policies.”

JLT said it believes considering cyber as a standalone line of business rather than a peril will result in more resilience to cyber risk in the re-insurance market and this shift will benefit insurance buyers in the form of “greater certainty, expertise, capacity and stability from the re-insurance market in a complex and growing risk area.”

“Cyber exposures have grown considerably for companies of all sizes and domiciles in recent years, causing business costs to rise sharply,” said David Flandro, global head of Analytics, JLT Re.

“Companies face challenges in understanding their exposures and the type of insurance cover needed as the underlying drivers of cyber risks frequently change, requiring insurers and brokers to explain and quantify these exposures as clearly as possible. Increased coordination and collaboration between key markets will be crucial in meeting evolving demands and unlocking the huge potential associated with cyber for the benefit of companies and carriers alike.”

Standalone policies would help eliminate the risk of silent exposures and, ultimately, make the market more resilient.

JLT notes that insurance approaches for cyber risk can differ considerably from one company to the next, a reflection of the view that cyber can either be considered a peril that falls within traditional property/casualty products or a line of coverage in its own right.

JLT views a standalone cyber market as a way to address both buyers’ changing needs and insurers’ uncertainty.

“As more premiums flow into the standalone market, carriers will be able to evaluate and price risks more accurately as good-quality claims data and sophisticated modelling tools become increasingly accessible,” said Sarah Stephens, head of Cyber, Technology and Media E&O for JLT.

“This, in turn, will help ensure the market is better placed to trade through future systemic losses by encouraging innovative reinsurance and insurance-linked securities (ILS) structures.”

Stephens said governmental support is also likely to be needed in back-stopping some of the more catastrophic loss scenarios.

She said a more robust cyber market, with comprehensive, standalone policies at its core, would also help “eliminate the risk of silent exposures and, ultimately, make the market more resilient to future catastrophic cyber losses.”

She said given the strong likelihood of a major cyber event in future, the market needs to prevent a situation where (re)insurance buyers are faced with a dearth of capacity as happened in the aftermath of the 9/11 attacks.

Given the complexity of cyber risks, access to reinsurance capital is essential in alleviating the primary market’s aggregation burden and supporting the innovative cover needed for future cyber risks, according to JLT.

“There is sufficient reinsurance capacity for the current cyber insurance market and increased reinsurer appetite for cyber risk bodes well for long-term growth prospects,” according to Chris Bennett, partner, London Market and International Non-Marine, Cyber Treaty for JLT Re. “New approaches have emerged in recent years as competition between reinsurance companies has stiffened, making non-proportional structures such as excess-of-loss, stop-loss and aggregate covers as commonplace today as the more traditional quota share arrangements.”

The report notes that cyber risk has changed since the first policy was underwritten around the turn of the century and it claims the market now needs to respond decisively to the changing scale and scope of cyber risk. For example, data breaches have become more frequent in the last five years, with the number of reported data breaches globally rising by more than 300 percent.


 
Number of Global Reported Data Breaches and Records Lost – 2011 to 2016
(Source: Risk Based Security/Cyber Risk Analytics)
 
The report also cites considerable concern over the scalability of the risk, where one cyber event is capable of triggering multiple claims under different policies at national, or even global, levels. As technologies become further embedded in the operations and strategies of organisations across all geographies and sectors, malicious actors will increasingly look to exploit the vulnerabilities associated with innovations such as the Internet of Things, cloud computing, autonomous vehicles, machine automation and connected devices.

“Market participants have begun to explore how catastrophic cyber risks such as systemic cloud service provider failures or targeted cyber-attacks on power grids could impact businesses and risk carriers,” said Flandro.

“These efforts have highlighted the real potential for multi-billion dollar (re)insured pay-outs. Products designed to mitigate such systemic cyber risk accumulations are less readily available, but considerable progress can be achieved by drawing on the expertise that exists in the standalone cyber market.”

Insurance Journal:

You Might Also Read:

Cybercrime Cost The Global Economy $450Billion In 2016:

Insurers Get Much More Cautious About Cyber Risk:

Cyber Insurance: 7 Questions To Ask:

UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£):

Why SMEs Need Cyber Insurance:

 

 

 

« Intelligence Agency Backs Start-Up Spy Apps
US vs. North Korea Cyberwar Underway »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

Global Forum on Cyber Expertise (GFCE)

Global Forum on Cyber Expertise (GFCE)

GFCE is a global platform for countries, international organizations and private companies to exchange best practices and expertise on cyber capacity building.

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Cyware

Cyware

Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.