Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance market holds the promise of unlocking the potential for meaningful coverage for both insurers and buyers. That is according to a new report by JLT Re and JLT Specialty Limited.

According to the report released at the 2017 annual Risk Management RIMS Conference, buyers are clamoring for better cyber products to address the growing and complex risks of cyber, while underwriters are being cautious over concerns around “unquantified cyber exposures potentially buried in traditional policies.”

JLT said it believes considering cyber as a standalone line of business rather than a peril will result in more resilience to cyber risk in the re-insurance market and this shift will benefit insurance buyers in the form of “greater certainty, expertise, capacity and stability from the re-insurance market in a complex and growing risk area.”

“Cyber exposures have grown considerably for companies of all sizes and domiciles in recent years, causing business costs to rise sharply,” said David Flandro, global head of Analytics, JLT Re.

“Companies face challenges in understanding their exposures and the type of insurance cover needed as the underlying drivers of cyber risks frequently change, requiring insurers and brokers to explain and quantify these exposures as clearly as possible. Increased coordination and collaboration between key markets will be crucial in meeting evolving demands and unlocking the huge potential associated with cyber for the benefit of companies and carriers alike.”

Standalone policies would help eliminate the risk of silent exposures and, ultimately, make the market more resilient.

JLT notes that insurance approaches for cyber risk can differ considerably from one company to the next, a reflection of the view that cyber can either be considered a peril that falls within traditional property/casualty products or a line of coverage in its own right.

JLT views a standalone cyber market as a way to address both buyers’ changing needs and insurers’ uncertainty.

“As more premiums flow into the standalone market, carriers will be able to evaluate and price risks more accurately as good-quality claims data and sophisticated modelling tools become increasingly accessible,” said Sarah Stephens, head of Cyber, Technology and Media E&O for JLT.

“This, in turn, will help ensure the market is better placed to trade through future systemic losses by encouraging innovative reinsurance and insurance-linked securities (ILS) structures.”

Stephens said governmental support is also likely to be needed in back-stopping some of the more catastrophic loss scenarios.

She said a more robust cyber market, with comprehensive, standalone policies at its core, would also help “eliminate the risk of silent exposures and, ultimately, make the market more resilient to future catastrophic cyber losses.”

She said given the strong likelihood of a major cyber event in future, the market needs to prevent a situation where (re)insurance buyers are faced with a dearth of capacity as happened in the aftermath of the 9/11 attacks.

Given the complexity of cyber risks, access to reinsurance capital is essential in alleviating the primary market’s aggregation burden and supporting the innovative cover needed for future cyber risks, according to JLT.

“There is sufficient reinsurance capacity for the current cyber insurance market and increased reinsurer appetite for cyber risk bodes well for long-term growth prospects,” according to Chris Bennett, partner, London Market and International Non-Marine, Cyber Treaty for JLT Re. “New approaches have emerged in recent years as competition between reinsurance companies has stiffened, making non-proportional structures such as excess-of-loss, stop-loss and aggregate covers as commonplace today as the more traditional quota share arrangements.”

The report notes that cyber risk has changed since the first policy was underwritten around the turn of the century and it claims the market now needs to respond decisively to the changing scale and scope of cyber risk. For example, data breaches have become more frequent in the last five years, with the number of reported data breaches globally rising by more than 300 percent.


 
Number of Global Reported Data Breaches and Records Lost – 2011 to 2016
(Source: Risk Based Security/Cyber Risk Analytics)
 
The report also cites considerable concern over the scalability of the risk, where one cyber event is capable of triggering multiple claims under different policies at national, or even global, levels. As technologies become further embedded in the operations and strategies of organisations across all geographies and sectors, malicious actors will increasingly look to exploit the vulnerabilities associated with innovations such as the Internet of Things, cloud computing, autonomous vehicles, machine automation and connected devices.

“Market participants have begun to explore how catastrophic cyber risks such as systemic cloud service provider failures or targeted cyber-attacks on power grids could impact businesses and risk carriers,” said Flandro.

“These efforts have highlighted the real potential for multi-billion dollar (re)insured pay-outs. Products designed to mitigate such systemic cyber risk accumulations are less readily available, but considerable progress can be achieved by drawing on the expertise that exists in the standalone cyber market.”

Insurance Journal:

You Might Also Read:

Cybercrime Cost The Global Economy $450Billion In 2016:

Insurers Get Much More Cautious About Cyber Risk:

Cyber Insurance: 7 Questions To Ask:

UK Parliamentary Committee Wish To Penalise CEOs for Cyber Breaches (£):

Why SMEs Need Cyber Insurance:

 

 

 

« Intelligence Agency Backs Start-Up Spy Apps
US vs. North Korea Cyberwar Underway »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Wing Security

Wing Security

Wing fosters a stronger security culture by engaging SaaS end-users and enabling easy communication with security teams.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.