Cyber Insurance Has Distinctly Risky Characteristics

Although cyber risk premiums have expanded sizably in recent years with loss ratios that compare favorably to other product lines, the danger of accumulation risks is a key concern for the market, according to a study released by insurance industry think tank The Geneva Association.

The study, titled “Advancing Accumulation Risk Management in Cyber Insurance,” identifies three prerequisites to a sustainable cyber insurance market:

• Customers and insurers must facilitate resilience at the source of risk for the principles of insurability to apply.

• Insurers must be able to achieve an acceptable return on capital.

• Insurance markets need to be able to withstand shocks from extreme events, which means absorbing accumulation risk.

The concern about accumulation risk is widely held across the industry and is the reason the Geneva Association report is focusing on the market’s ability to withstand extreme events, said Anna Maria D’Hulster, secretary general of The Geneva Association (GA), in a forward to the report.

“Expanding the boundaries of insurability is not new for insurers. However, cyber risks are taking us into uncharted territory,” she added. “Both exposures and threats have distinct characteristics, which give rise to unprecedented challenges.”

“These challenges require that insurers strengthen their core underwriting capabilities, in particular exposure measurement, claims assessment, and accumulation modelling,” the study said.

The report went on to highlight four cyber accumulation risk challenges:

• A single large event or a series of consecutive events may make affirmative cyber insurance unprofitable. (The report explained that insurers provide affirmative coverage in standalone and package policies).

• Insurers and reinsurers (for which risk accumulation may be more pronounced than for primary insurers) could underestimate non-affirmative cyber exposure leading to an unplanned shock from a major event. The report explained that non-affirmative cyber exposure occurs when a cyber attack causes major losses by triggering coverages in other classes. [Editor’s note: Insurers face non-affirmative, or silent cyber exposures, when they offer all-risk policies and other liability insurance policies that have not excluded cyber risks.]

• Data are of insufficient quality, are incomplete and/or lack the necessary consistency for more advanced modeling techniques.

• Governments predominantly fail to provide frameworks for the sharing of large-scale cyber-terrorism-induced losses.

Market Consequences

The study said there are many market consequences if risks from these challenges materialize.

“Insurers and reinsurers could withdraw from the market after unacceptably high losses and fear of repeat events,” the study continued, noting that such losses also could stall the growth of the small alternative capital market and prevent insurers from accessing needed capacity.

In addition, re/insurers could introduce tighter policy terms and increase the number of exclusions and/or make buy-backs prohibitively expensive, the GA study said.

“The lack of confidence in advanced model outputs could stifle growth if models are deemed to be too blunt for insurers to extend portfolios or offer higher coverage levels,” which could result in a further constraint on the amount of coverage available for larger enterprises and leave the market for small and medium enterprises underdeveloped.

“A large event may also trigger regulatory intervention with the risk for insurers having to provide cover with uneconomic terms and rates,” GA said.

In response, GA said, insurers have formulated several approaches:

• Developing data analytics that analyze the characteristics of cyber risk as well as data protocols that combine company infor­mation with digital risk indicators.

• Novel approaches to analyzing the risk “footprint” and corresponding threats affecting the size of the footprint. For example, the mathematics of epidemiology could be applied to the spread of computer viruses.

• Forward-looking threat assessments including external expert inputs, while developing in-house technical know-how.

• Mapping cloud-related interconnectivity and digital supply chains, and using machine learning to assess the relationship between claims frequency and multi-dimension exposure.

• “Of equal importance is the need to maintain underwriting discipline. Cyber risk is not unique in this respect. Historically, many property-casualty classes have suffered when underwriting standards slipped or when prices failed to adequately reflect the cost of risk,” the study went on to say.

“Many insurers perceive the current rating environment as soft and likely inadequate should any of the above risks materialize,” the study added. “Furthermore, the growing threat from terrorism adds urgency to such concerns, and the appropriate treatment for this risk in war and terrorism exclusions will be key.”

Cyber Models

Accumulation modeling supports a greater understanding of risk interconnectivity, whether on a wide scale or within specific industry segments, which improves the ability of underwriters to accept risk, the study affirmed.

Market development is likely to continue to benefit from modeling advances, said the report, expressing cautious optimism that as long as underwriting discipline is maintained “insurers are well-positioned to ensure the cyber insurance market’s viability and achieve sustainable growth in the future.”

“Cyber risk has distinct characteristics. Exposure bases are hard to define and measure. Historical claims data are scarce and not good predictors. Threats are constantly evolving, can spread widely and rapidly, and a series of consecutive large events is plausible. Moreover, a high degree of interconnectivity may result in potentially boundless impacts,” said Daniel Hofmann, senior adviser Insurance Economics at The Geneva Association and primary author of the study, in a statement.

Insurance Journal:

You Might Also Read:

Insurers Are Not Ready For IoT

« Catching The Silent Attacker, And The Next Phase Of Cyber AI
NATO Live-Fire Cyber Exercise »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Labs/02

Labs/02

Labs/02 is a seed-stage incubator with a mission to advance cutting-edge technology in innovative areas including AI, deep learning, autonomous transportation, and smart cities.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Ermetic

Ermetic

Ermetic’s identity-first cloud infrastructure security platform provides holistic, multi-cloud protection in an easy-to-deploy SaaS solution.

Logically.ai

Logically.ai

Logically combines artificial intelligence with expert analysts to tackle harmful and manipulative content at speed and scale.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.