Tags » Cyber Insurance

The Actuarial Cyber Coverage Conundrum

Are insurance companies collecting enough money to cover future cyber events?

Nobody really knows, but there is reason for concern.

Insurance companies are offering more cyber coverage to gain market share. 191 more words

Insurance

TAKE UP OF CYBER INSURANCE REMAINS LOW

Marsh has undertaken an in-depth study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. 2,112 more words

Brian Pennington

What is Cyber Insurance?

You may have heard the term “Cyber Insurance” in exceptionally glowing terms, describing it as the next big thing that no sensible business should be without. 1,010 more words

Security Features

The majority Of Risk Professionals Without Coverage Are Considering Purchasing Cyber Insurance

RIMS, the risk management society ™ has conducted its first Cyber Survey 2015 to explore strategies implemented by risk professionals including insurance investments, exposures, cyber security ownership, government involvement, as well as identification methods and response procedures. 208 more words

Brian Pennington

Answers Straight from the Headlines - Will Cyber Insurance Cover Your Business Associate's Breach?

I’ve heard covered entities make the comment, “Well our insurance will cover our losses if we have a breach.”  I wouldn’t be so sure about that anymore.   179 more words

Risk Management

Leading the charge against cyber privacy violations

Jay Edelson’s firm, Edelson PC, has been lead plaintiff counsel in highly publicized class-action suits brought against technology companies on the grounds of privacy violations. His firm has targeted early stage start-ups to technology giants like Amazon, Apple, and Google. 516 more words

Property & Casualty

June 04 2015, Episode 366, Show Notes

Episode 365 of The CyberJungle is about 25 minutes long.  The interview with Yuri Gubanov, CEO of Belkasoft begins at about 16:10.   You may download the file directly… 187 more words

Vulnerabilities