How Can the Cyber Insurance Market Increase Capacity? It’s Spelled I-L-S, Says Verisk

ILS= Insurance Linked Securities, which are financial instruments supporting retrocession, or reinsurance for reinsurers. Verisk surveyed ILS funds on their appetite for cyber insurance. “Thirteen ILS funds, representing nearly $60 billion in AuM, reported they are interested in providing cyber reinsurance protection. Most of them have never done so before. Eight of those funds — … Read more

Cyber Insurers Unlikely to Face Major Losses from Russia/Ukraine War: DBRS Morningstar

Insurers have been tightening their war exclusions and clarifying attribution requirements, especially after the recent court win by Merck over reimbursement of its losses from 2017’s NotPetya malware attack. “However, in DBRS Morningstar’s opinion, attribution of cyber warfare remains a challenge because it places the onus on the insurer to demonstrate that a cyber incident … Read more

Useful Report from CyberCube Goes Beyond Fluff on Cyber Insurance Threats Emerging from Ukraine/Russia War 

The new report goes beyond the growing media and PR generalities on this topic. It includes specifics on types of potential attacks and other actionable data. It also provides context useful for the “Act of War” discussions now occurring between cyber insurers and their clients. From the report: …the prolific ransomware gang Conti has sided … Read more

Ukraine Companies Offered Free Cyber Services by Coalition, Which Now Enters the Fray Publicly

Coalition is no doubt already on the radar of Moscow-linked hackers and this move seems sure to attract more attention. Given the modern networked nature of war, and the way attackers typically view those defending their targets, a gesture like this can create real risk for a company trying to do the right thing (and … Read more

Can Microsoft Exchange Server Be A “Pre-Existing Condition” For Cyber Insurers?  

Article includes a cyber insurance application highlighting legacy software… “Insurers determine whether an SME is worth the risk by assessing where there are sufficient security controls and patching strategies in place. They’ve recently keyed in on several high-profile software vulnerabilities related to Microsoft Exchange Server, for example. Exchange’s presence, and the absence of critical security … Read more

×