Using cyber insurance to run virtuous circles around cyber risk

2018 ◽  
Vol 2018 (10) ◽  
pp. 6-8
Author(s):  
Mike Lloyd
Keyword(s):  
Author(s):  
Petar Radanliev ◽  
Rafael Mantilla Montalvo ◽  
Razvan Nicolescu ◽  
Michael Huth ◽  
Stacy Cannady ◽  
...  

This paper is focused on mapping the current evolution of Internet of Things (IoT) and its associated cyber risks for the Industry 4.0 (I4.0) sector. We report the results of a qualitative empirical study that correlates academic literature with 14 - I4.0 frameworks and initiatives. We apply the grounded theory approach to synthesise the findings from our literature review, to compare the cyber security frameworks and cyber security quantitative impact assessment models, with the world leading I4.0 technological trends. From the findings, we build a new impact assessment model of IoT cyber risk in Industry 4.0. We therefore advance the efforts of integrating standards and governance into Industry 4.0 and offer a better understanding of economics impact assessment models for I4.0.


2017 ◽  
Vol 21 (5) ◽  
pp. 997-1018 ◽  
Author(s):  
Arunabha Mukhopadhyay ◽  
Samir Chatterjee ◽  
Kallol K. Bagchi ◽  
Peteer J. Kirs ◽  
Girja K. Shukla

2019 ◽  
Vol 7 (5) ◽  
pp. 35-42
Author(s):  
Александр Суворов ◽  
Aleksandr Suvorov ◽  
Мария Матанцева ◽  
Mariya Matanceva ◽  
Евгения Плотникова ◽  
...  

A review of the cyber insurance domain has been carried out with a description of classical terms from the insurance industry. Have been considered two the most comprehensive today definitions of cyber risk in authors’ opinion. A diagram of processes for cyber risk management using insurance has been presented, and the place of cyber-risk among other company’s risks has been demonstrated, i. e. the context of cyber risk among the risks of any commercial organization has been shown. A typical cyber insurance process has been described, and a scheme of cyber insurance processes has been developed. A brief description of problem areas and controversial issues in cyber insurance, with which cyber-risk insurance practices may face, has been presented, as well as a table showing at which stage of cyber-insurance the specific problems may arise. Has been provided the basic economic utility function, which formalizes decision making for agents with a different attitude to risk. Standards in cyber security, and various software products that can be used as a tool for assessing the security level of an enterprise’s IT infrastructure have been presented, and it has been demonstrated how these products can help in cyber risk assessment. Different methods used at each stage of cyber insurance have been shown.


Risks ◽  
2021 ◽  
Vol 9 (12) ◽  
pp. 224
Author(s):  
Yeftanus Antonio ◽  
Sapto Wahyu Indratno ◽  
Rinovia Simanjuntak

Cyber insurance ratemaking (CIRM) is a procedure used to set rates (or prices) for cyber insurance products provided by insurance companies. Rate estimation is a critical issue for cyber insurance products. This problem arises because of the unavailability of actuarial data and the uncertainty of normative standards of cyber risk. Most cyber risk analyses do not consider the connection between Information Communication and Technology (ICT) sources. Recently, a cyber risk model was developed that considered the network structure. However, the analysis of this model remains limited to an unweighted network. To address this issue, we propose using a graph mining approach (GMA) to CIRM, which can be applied to obtain fair and competitive prices based on weighted network characteristics. This study differs from previous studies in that it adds the GMA to CIRM and uses communication models to explain the frequency of communications as weights in the network. We used the heterogeneous generalized susceptible-infectious-susceptible model to accommodate different infection rates. Our approach adds up to the existing method because it considers the communication frequency and GMA in CIRM. This approach results in heterogeneous premiums. Additionally, GMA can choose more active communications to reflect high communications contribution in the premiums or rates. This contribution is not found when the infection rates are the same. Based on our experimental results, it is apparent that this method can produce more reasonable and competitive prices than other methods. The prices obtained with GMA and communication factors are lower than those obtained without GMA and communication factors.


Author(s):  
Gareth William Peters ◽  
Pavel V. Shevchenko ◽  
Ruben D. Cohen ◽  
Diane Maurice
Keyword(s):  

Author(s):  
Gabriela Zeller ◽  
Matthias Scherer

AbstractAfter scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study.


Author(s):  
David Nicolas Bartolini ◽  
Andreas Ahrens ◽  
Jelena Zascerinska

Cyber risk assessment for insurability verification has been paid a lot of research interest as cyber insurance represents a new dynamic segment of market with considerable growth potential for insurers. As customer’s practices and processes consistently lead to the final overall result, customer's behaviour has to be described in detail. The aim of the present paper is to design an instrument (questionnaire) for customer’s cyber risk assessment in insurability verification. The method for building an instrument (questionnaire) is empirical research. Empirical research is based on use of empirical evidence. A questionnaire with 11 questions is proposed.


Author(s):  
Nataliia Krasilich

General global trends in space activities are largely related to the need to protect space information technology from possible cyber threats. The issue of cybersecurity in space activities needs to be thoroughly studied and resolved, as the current state of space activities and existing mechanisms of international and state regulation do not provide a sufficient solution. Disruption of the process of receiving and exchanging information through space information systems can lead to significant consequences. The growing number of cyber threats is becoming more common and destructive. Therefore, the assessment of cyber vulnerabilities in space systems is an important task that must be addressed both at the stage of creation and development, and in the operation of such systems. This, in turn, requires the availability of tools to address the above tasks and qualified personnel. One of the legal ways to protect against the negative effects of cyber threats, including in the field of space activities, may be cyber risk insurance, as a financial and legal mechanism for compensation, loss of losses caused by cyber attacks. In Ukraine, cyber insurance is in its infancy and needs to develop innovative approaches to further development, taking into account the accumulated positive experience of foreign countries in this area. At the moment, insurance companies are only developing the practice of cyber risk insurance and such insurance contracts are isolated. In the current environment, as a rule, the issue of cyber risk insurance is included in comprehensive property insurance contracts, liability insurance, financial risks, which significantly limits the compensation of damages. The main difficulty in the process of indemnification under a cyber risk insurance contract is to record the fact of the insured event, the amount of damage and prove the causal link between the insured event and the claimed losses, as the amount of damage must not only be calculated but also documented. Space information technologies, which are increasingly penetrating economic and social processes, necessitate the development of a segment of cyber insurance in the field of space activities, which will provide adequate insurance protection and compensation for damages to the insured due to cyber incidents. Cyber risk insurance issues should be reflected in national legislation.


2018 ◽  
Vol 43 (02) ◽  
pp. 417-440 ◽  
Author(s):  
Shauhin A. Talesh

While data theft and cyber risk are major threats facing organizations, existing research suggests that most organizations do not have sufficient protection to prevent data breaches, deal with notification responsibilities, and comply with privacy laws. This article explores how insurance companies play a critical, yet unrecognized, role in assisting organizations in complying with privacy laws and dealing with cyber theft. My analysis draws from and contributes to two literatures on organizational compliance: new institutional organizational sociology studies of how organizations respond to legal regulation and sociolegal insurance scholars' research on how institutions govern through risk. Through participant observation at conferences, interviews, and content analysis of insurer manuals and risk management services, my study highlights how insurers act as compliance managers for organizations dealing with cyber security threats. Well beyond pooling and transferring risk, insurance companies offer cyber insurance and unique risk management services that influence the ways organizations comply with privacy laws.


Sign in / Sign up

Export Citation Format

Share Document