TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/Cyber-insurance-explained-from-selection-to-post-purchase

Cyber insurance explained, from selection to post-purchase

By Sherri Davidoff

"There are only two types of companies: those that have been hacked and those that will be," then-FBI director Robert S. Mueller told attendees of the RSA conference a few years back. Much like fire and floods, cybersecurity disasters can hit any organization. Damage can include financial loss, reputational impacts, operational outages and more.

Cyber insurance has become a key tool for transferring risk to third parties and ensuring that you have access to a qualified incident response team during a cybersecurity crisis. What's more, certain types of cyber insurance can provide you with free or discounted access to valuable security resources that can reduce your risk.

Not all cyber insurance is created equal. Read on to learn about the types of cyber insurance, how to select your coverage and key steps to take after you have cyber insurance in place.

Cyber insurance explained: Start with coverage questions

Unlike auto insurance, there is no standard form of cyber insurance. Insurers offer a wide variety of products, and often the fine print makes a big difference in your coverage.

Common types of cyber coverage include the following:

What's excluded?

Cyber insurance policies normally have a list of exclusions, such as claims resulting from certain conditions:

If your data is in the cloud, make sure you understand how that affects your insurance coverage. Your policy may limit coverage of incidents involving data in the cloud, and typically cloud providers' contracts limit their liability, too.

Selecting your coverage

The purpose of obtaining cyber insurance is to transfer cybersecurity risks to a third party. However, most organizations simply tick the "cyber" checkbox and don't carefully consider what risks they actually need to transfer.

Every organization is different. Even once the ins and outs of cyber insurance are explained and make sense, the next and most important step remains: making sure you get the coverage your organization really needs. This requires a methodical selection and review process. Here are some tips:

Next steps: After buying cyber insurance, explained

Once you sign up for a policy, your work isn't done! Carefully review your new policy so that you understand the insurer's process and requirements for filing a claim. For example, you may be required to report incidents within a certain period of time to qualify for coverage. Update your incident response playbook to include important details relating to your cyber insurance policy.

Train your cybersecurity responders so that they know when and how to bring in your insurer. Depending on your coverage type, you may want to meet with your cyber insurance contacts proactively.

Finally, take advantage of your insurer's resources, whether it is a cybersecurity portal, training opportunities or other options. Share access to these resources within your company so that you are maximizing the value of your policy. Often, these resources will help you reduce your risk of a cybersecurity incident, which is a win-win for you and your insurer.

In that same speech at the 2012 RSA conference, Robert Mueller said he could foresee cases converging so that eventually all companies would fall into one category: "companies that have been hacked and will be hacked again." It seems those days are upon us, and most -- if not all -- organizations should be looking into what cyber insurance coverage they require.

20 Nov 2020

All Rights Reserved, Copyright 2000 - 2026, TechTarget | Read our Privacy Statement