Google Exec Makes the Case for a Federal Cyber-Insurance Backstop

Google exec @MonicaShokrai details the benefits of such a federal policy, including attracting more capital to the cyber insurance market: “Broadly speaking, insurance can drive resilience as a society: Not only can it enable a fast and effective distribution of funds in the event of a catastrophe, it can also provide a predefined path to … Read more

Watch Out for “Long-Tail” Cyber Claims: WSJ 

“Financial settlements with regulators and affected customers can sometimes rise into the millions of dollars and take several years to resolve. For example, claims from the 2013 breach at retailer Target that resulted in the data of approximately 40 million customers being stolen continued for several years and the company was still receiving insurance payments … Read more

World Dodged 100 Potentially Catastrophic Hacks Over Past 6 Years: CyberCube 

“In a new report, CyberCube conducted an analysis of cyber cat events and documented over 100 global cyber aggregation events with catastrophic potential over the past six years – equating to approximately one every three weeks. The vast majority of those events were resolved by the cybersecurity community with minimal financial loss to insurers. However, … Read more

Expect More Disclosures from Public Companies Concerning Their Cyber Insurance 

“While many companies have already started to incorporate general disclosure of cyber liability insurance in their discussion of cyber risks, we should expect to see this continue, especially as coverage limitations and exclusions in cyber liability insurance policies may pose their own risks.” The report notes that while reporting is good, there can be too … Read more

Hackers Get Trickier as Companies & Cyber Insurers Improve Their Defenses 

“That’s where tactics like double extortion come in. With double extortion, a cybercriminal might ask for a ransom before they provide a decryption key while also threatening to leak sensitive data if they don’t get paid. This tactic targets companies with strong backups, which may not need to regain their encrypted files, and puts additional … Read more

×