New Analytics Product For Cyber Insurance

Cyber risk analytics specialist CyberCube has launched a new software-as-a-service application designed specifically for insurance brokers called “Broking Manager" to povide more accurate client insight for both generalist and cyber specialist brokers.

The product is designed to help brokers quantify, understand and explain to their clients the sources and financial impact of cyber risk exposure.

This development recognises that insurance advisers need to be able to educate sales prospects and existing clients while demonstrating an understanding of their needs and exposures. 

Brokers are expected to align clients’ goals, budgets and exposure to the appropriate limits and optimal carrier policies and in the case of cyber risk, this means understanding the types of scenarios that may cause financial loss and the costs that would drive losses. 

Broking Manager empowers brokers to instantly produce a cyber financial loss report on millions of companies, while providing rich information to help brokers articulate their clients’ cyber exposure.  It does so by leveraging advanced models that draw on data from a large number of sources including behind the firewall and perimeter scan data, historical incidents and losses, and firmographic data. The product offers a stream-lined approach to generating the financial exposure impact of client-specific security and business practices. Brokers can also leverage the product to educate clients on potential loss classes, recent cyber events, and bench-marking of cyber risks against peers.

With cyber risk, it is important to understand the types of scenarios that may cause financial loss and the costs that would drive losses, explained the San Francisco-based company.  “With Broking Manager we set out to tackle the most fundamental question facing brokers today; what coverages and limits do companies need? We’ve had considerable interest from the broking community internationally, so we felt the time was right to build and launch this product,” said Oren Schetrit, CyberCube’s director of Product.

“Brokers play a vital role in helping clients identify and manage risk. Our goal is to empower them to quantify and explain cyber risk exposure to a broad audience without becoming experts in information security,” added Schetrit. “Broking Manager will promote informed conversations that will ultimately lead to better buying decisions.”

Ashwin Kashyap, co-founder of CyberCube and head of Product and Analytics, said: “Cyber insurance as a line of business is still in its early stages of growth and there is a clear need for a solution to help companies make informed decisions on what they need to buy.... As trusted advisors to companies on their cyber insurance purchase, insurance brokers play a very important role in the ecosystem by connecting insurance buyers with carriers. CyberCube has built a solution to enable the growth of the cyber insurance market and support this important segment in the insurance value chain.”

Broking Manager is the third product in CyberCube’s suite of applications, alongside Portfolio Manager which is used by insurers to stress tests portfolios of cyber risks against dozens of cyber-based scenarios and  Account Manager, which is used to provide underwriting teams with a detailed analysis of cyber risk.

The company believes that a lack of historical data and the rapidly evolving nature of cyber risk and events which involve ‘active adversaries’ in the form of criminals or terrorists presents special challenges for evaluation of risk.

CyberCube has shared the process that shapes its cyber threat scenarios in a new paper titled 'Designing a Cyber Catastrophe' and it offers an insight into CyberCube’s scenario development process as the company creates new threat scenarios and refines existing ones. Theses  scenarios allow reinsurers and brokers that use CyberCube products to analyse and stress-test their portfolios of cyber risk, the company said.

Cybercube:      Insurance Buisness:        Reinsurance News:        Verdict:         BusinessWire:      Insurance Journal


You Migh Also Read:  


Cyber Incidents Jump Up The Risk Index:

 

 

 

« The Victims Of Cybercrime In Britain
Hackers Succeed In Doing More Harm Than Insiders »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Exein

Exein

Exein are on a mission to build the world’s first ecosystem for firmware security so that all different types of firmware are secure around the world.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.