Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance market holds the promise of unlocking the potential for meaningful coverage for both insurers and buyers. That is according to a new report by JLT Re and JLT Specialty Limited.

According to the report released at the 2017 annual Risk Management RIMS Conference, buyers are clamoring for better cyber products to address the growing and complex risks of cyber, while underwriters are being cautious over concerns around “unquantified cyber exposures potentially buried in traditional policies.”

JLT said it believes considering cyber as a standalone line of business rather than a peril will result in more resilience to cyber risk in the re-insurance market and this shift will benefit insurance buyers in the form of “greater certainty, expertise, capacity and stability from the re-insurance market in a complex and growing risk area.”

“Cyber exposures have grown considerably for companies of all sizes and domiciles in recent years, causing business costs to rise sharply,” said David Flandro, global head of Analytics, JLT Re.

“Companies face challenges in understanding their exposures and the type of insurance cover needed as the underlying drivers of cyber risks frequently change, requiring insurers and brokers to explain and quantify these exposures as clearly as possible. Increased coordination and collaboration between key markets will be crucial in meeting evolving demands and unlocking the huge potential associated with cyber for the benefit of companies and carriers alike.”

Standalone policies would help eliminate the risk of silent exposures and, ultimately, make the market more resilient.

JLT notes that insurance approaches for cyber risk can differ considerably from one company to the next, a reflection of the view that cyber can either be considered a peril that falls within traditional property/casualty products or a line of coverage in its own right.

JLT views a standalone cyber market as a way to address both buyers’ changing needs and insurers’ uncertainty.

“As more premiums flow into the standalone market, carriers will be able to evaluate and price risks more accurately as good-quality claims data and sophisticated modelling tools become increasingly accessible,” said Sarah Stephens, head of Cyber, Technology and Media E&O for JLT.

“This, in turn, will help ensure the market is better placed to trade through future systemic losses by encouraging innovative reinsurance and insurance-linked securities (ILS) structures.”

Stephens said governmental support is also likely to be needed in back-stopping some of the more catastrophic loss scenarios.

She said a more robust cyber market, with comprehensive, standalone policies at its core, would also help “eliminate the risk of silent exposures and, ultimately, make the market more resilient to future catastrophic cyber losses.”

She said given the strong likelihood of a major cyber event in future, the market needs to prevent a situation where (re)insurance buyers are faced with a dearth of capacity as happened in the aftermath of the 9/11 attacks.

Given the complexity of cyber risks, access to reinsurance capital is essential in alleviating the primary market’s aggregation burden and supporting the innovative cover needed for future cyber risks, according to JLT.

“There is sufficient reinsurance capacity for the current cyber insurance market and increased reinsurer appetite for cyber risk bodes well for long-term growth prospects,” according to Chris Bennett, partner, London Market and International Non-Marine, Cyber Treaty for JLT Re. “New approaches have emerged in recent years as competition between reinsurance companies has stiffened, making non-proportional structures such as excess-of-loss, stop-loss and aggregate covers as commonplace today as the more traditional quota share arrangements.”

The report notes that cyber risk has changed since the first policy was underwritten around the turn of the century and it claims the market now needs to respond decisively to the changing scale and scope of cyber risk. For example, data breaches have become more frequent in the last five years, with the number of reported data breaches globally rising by more than 300 percent.


 
Number of Global Reported Data Breaches and Records Lost – 2011 to 2016
(Source: Risk Based Security/Cyber Risk Analytics)
 
The report also cites considerable concern over the scalability of the risk, where one cyber event is capable of triggering multiple claims under different policies at national, or even global, levels. As technologies become further embedded in the operations and strategies of organisations across all geographies and sectors, malicious actors will increasingly look to exploit the vulnerabilities associated with innovations such as the Internet of Things, cloud computing, autonomous vehicles, machine automation and connected devices.

“Market participants have begun to explore how catastrophic cyber risks such as systemic cloud service provider failures or targeted cyber-attacks on power grids could impact businesses and risk carriers,” said Flandro.

“These efforts have highlighted the real potential for multi-billion dollar (re)insured pay-outs. Products designed to mitigate such systemic cyber risk accumulations are less readily available, but considerable progress can be achieved by drawing on the expertise that exists in the standalone cyber market.”

Insurance Journal:

You Might Also Read:

Cybercrime Cost The Global Economy $450Billion In 2016:

Insurers Get Much More Cautious About Cyber Risk:

Cyber Insurance: 7 Questions To Ask:

UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£):

Why SMEs Need Cyber Insurance:

 

 

 

« Intelligence Agency Backs Start-Up Spy Apps
US vs. North Korea Cyberwar Underway »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.