Who will pay for your cyber liabilities?
Pushkal Mishra

Who will pay for your cyber liabilities?

Can you ever be fully insulated from cyber-attacks even though you have -

  • Well developed information security program that takes best practices from reputed management standards
  • Evolved security architecture with a perfect balance of *Red and *Blue teaming
  • Complied with all legal and regulatory requirements
  • Beaten the industry in security standards benchmarks
  • Cybersecurity aware workforce?

The truth is that no one is immune! The pace at which technology reinvents itself makes it a bit harder for security to catch up at the same pace. Besides, failure to upgrade technology and *residual risks act as a ticking time bomb.

While technical vulnerabilities are the biggest contributor to cyberattacks, off-late attacks are moving towards the exploitation of human vulnerabilities. And why not? Penetrating technology demands skills, time, and money whereas the exploitation of humans is a relatively cheaper endeavor as our curiosity, helpfulness, biases, and greed make us an easier target than technology. Consequently *phishing emails alone cause multi-million-dollar losses with lesser efforts.

So what is the way out?

I believe transferring some of those risks with an adequate cyber insurance policy is the answer to the question. Remember cyber insurance is not a frequency-based product that you want to use for smaller issues. It is a crisis product that should be designed and used when the usual measures don't work out.

So how does it work?

The first step in the cyber insurance scheme of things is to conduct the risk assessment to identify what is valuable and arrive objectively at the limit of liability and scope of cover.

Typically, a good policy should have at least the following terms but you can further tweak it to suit your risk exposure:

No alt text provided for this image

Once you've brainstormed over the scope, work on arriving at the limit of liabilities (the dollar value you want the insurer to cover you with). In some cases, you want full coverage such as in Forensic investigations while in others you can limit it to a certain percentage of overall liability, for example, fund transfer fraud 80% of the total liability.

Now that you’ve worked on essential pieces of Insurance cover, you now need to find the best Insurer who is viable and can pay as promised on the paper. Please keep in mind that the cyber insurance market is niche and only a few good players are offering comprehensive cover within reasonable cost. So, it is important for you to better understand the Insurer’s capability. Here are a few things that you might want to check before signing with them:

No alt text provided for this image

So the businesses that require processing/storing/sharing customer data or any organization that can't withstand the liabilities of cyber-attacks/data breaches should evaluate?Cyber Insurance as an instrument?to offset costs resulting from hefty fines, expenses, and claims.

Reference:

********************************************************************************

Re-Insurance:?In simple words, it is insurance for the insurers

Phishing: Type of social engineering attack that tricks the users into divulging confidential information

Residual Risk: It is a risk that remains after you have applied controls to the applicable threats

Red & Blue Teaming: Red teaming is a process to detect/penetrate system vulnerabilities by adopting an attacker like approach and Blue teaming is to defend them from exploitation

Rehan Alam

Information Security Engineer at Cisco

5 年

Excellent. Very informative article Pushkal.

Anupma Mishra

Senior Content Specialist l Digital Content Creator l Communications Specialist l

5 年

Very Informative!

Pinki Rani

Cyber security Lead

5 年

Great article sir.

Mandar Hastekar

Chief Financial Officer, Prudential Cambodia Laos Myanmar Hub

6 年

Well said Pushkal

要查看或添加评论,请登录

Pushkal Mishra的更多文章

  • ChatGPT : What You Don’t Know About

    ChatGPT : What You Don’t Know About

    Since the worldwide release in Mar'21, ChatGPT has rapidly amassed an enormous userbase, overshadowing any similar…

    11 条评论
  • Great books that I read in 2022

    Great books that I read in 2022

    Crucial Conversations - Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory When talking gets…

    6 条评论
  • Interesting books that kept me going in 2021

    Interesting books that kept me going in 2021

    The past year was pretty tectonic for all of us due to COVID-19. We experienced the fragility of human life and the…

    15 条评论
  • Are you working from home?

    Are you working from home?

    While the world is battling with COVID-19, Information security professionals have a double duty to do. 1.

    11 条评论
  • Cloud Security Architecture

    Cloud Security Architecture

    We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational…

    6 条评论
  • Top 5 Information Security Reports

    Top 5 Information Security Reports

    As a security professional we always wonder about new cyber threats and how the world is reacting to those. Since there…

    7 条评论
  • How mature is your Application Security Program?

    How mature is your Application Security Program?

    Business applications are vital for the successful functioning of any organization. Therefore, managing their…

    2 条评论
  • How may I help You (That little Chatbot in your website) !

    How may I help You (That little Chatbot in your website) !

    There has been a wide adoption of A.I.

    9 条评论

社区洞察

其他会员也浏览了