cyber insurance
Recently Published Documents


TOTAL DOCUMENTS

208
(FIVE YEARS 118)

H-INDEX

15
(FIVE YEARS 5)

Risks ◽  
2021 ◽  
Vol 9 (12) ◽  
pp. 224
Author(s):  
Yeftanus Antonio ◽  
Sapto Wahyu Indratno ◽  
Rinovia Simanjuntak

Cyber insurance ratemaking (CIRM) is a procedure used to set rates (or prices) for cyber insurance products provided by insurance companies. Rate estimation is a critical issue for cyber insurance products. This problem arises because of the unavailability of actuarial data and the uncertainty of normative standards of cyber risk. Most cyber risk analyses do not consider the connection between Information Communication and Technology (ICT) sources. Recently, a cyber risk model was developed that considered the network structure. However, the analysis of this model remains limited to an unweighted network. To address this issue, we propose using a graph mining approach (GMA) to CIRM, which can be applied to obtain fair and competitive prices based on weighted network characteristics. This study differs from previous studies in that it adds the GMA to CIRM and uses communication models to explain the frequency of communications as weights in the network. We used the heterogeneous generalized susceptible-infectious-susceptible model to accommodate different infection rates. Our approach adds up to the existing method because it considers the communication frequency and GMA in CIRM. This approach results in heterogeneous premiums. Additionally, GMA can choose more active communications to reflect high communications contribution in the premiums or rates. This contribution is not found when the infection rates are the same. Based on our experimental results, it is apparent that this method can produce more reasonable and competitive prices than other methods. The prices obtained with GMA and communication factors are lower than those obtained without GMA and communication factors.


2021 ◽  
pp. 58-78
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “What do I need to know about cyber frameworks, standards, and laws?” distills the complex landscape of cyber risk laws, requirements, and standards. The chapter begins with a case study on Nielsen Holdings’ legal and business trouble with the European General Data Protection Regulation (GDPR). It distinguishes compliance from security—explaining how readers can achieve both—and clarifies the dynamic, complex legal landscape in a world of ever-evolving cyber risk. It reviews legislation relating to cyber risk including the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GBLA), the Federal Information Security Management Act (FISMA), and GDPR. The chapter describes the importance of adopting the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework, creating a cyber policy/act/law/regulation “watch list” and purchasing cyber insurance. At the chapter’s end Falco shares Embedded Endurance strategy insight from his experience leading a team developing a cyber standard of care.


2021 ◽  
pp. 160-172
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I embed cyber risk management in all aspects of the organization?” addresses how to adopt an Embedded Endurance cyber risk strategy in your day-to-day work as a cyber leader. The chapter begins with a case study about the NotPetya cyberattack, which highlights ongoing challenges in cyber insurance and illuminates the need for embedding cyber mitigation measures across all prioritized critical systems, networks, and data. The chapter describes how to develop an Embedded Endurance cyber risk strategy that is customized for your organization. This chapter walks readers through the key elements of a cyber strategy, from start to finish. This includes defining a risk framework, setting strategic goals, identifying metrics, and establishing strong leadership. The chapter concludes with experiences highlighting the real-world importance of an Embedded Endurance cyber risk strategy from Rosenbach and Falco.


Significance These problems also affect subnational governments, which have increasingly come under attack in recent years. They have suffered a string of outages and interruptions to crucial local services ranging from parking payment to real estate purchases. Impacts A private vendor providing security to multiple local government entities will become the single point of failure. Demand for cyber insurance at subnational level will rise, and ransom payments will continue if they are covered by insurers. The federal government will likely make cybersecurity aid to states contingent on tighter security standards.


2021 ◽  
pp. 36-55
Author(s):  
Judy Selby ◽  
Susannah J. Wakefield

2021 ◽  
pp. 53-58
Author(s):  
Andrew Jenkinson
Keyword(s):  

Author(s):  
Gabriela Zeller ◽  
Matthias Scherer

AbstractAfter scrutinizing technical, legal, financial, and actuarial aspects of cyber risk, a new approach for modelling cyber risk using marked point processes is proposed. Key covariates, required to model frequency and severity of cyber claims, are identified. The presented framework explicitly takes into account incidents from malicious untargeted and targeted attacks as well as accidents and failures. The resulting model is able to include the dynamic nature of cyber risk, while capturing accumulation risk in a realistic way. The model is studied with respect to its statistical properties and applied to the pricing of cyber insurance and risk measurement. The results are illustrated in a simulation study.


Significance Ransomware attacks have surged this year, and ransomware payments and cyber insurance premiums have also risen. Cyber risks are far outpacing the current size and shape of the cyber insurance market. Many more firms are buying cyber insurance and insurers are raising premiums and sharpening new policies. Impacts Calls for governments to ban ransomware payments are growing in the wake of multiplying attacks, but a full ban is unlikely. Public-private partnerships may play a key role in supporting cyber insurers, private firms and governments as cyberattacks grow increase. Large firms may consider creating their own insurance division to insure the rest of the firm for a premium and guard against price swings.


Sign in / Sign up

Export Citation Format

Share Document