Cyber insurance has evolved considerably since 1999 but commercial insurers lack standardization in cyber policies and there is not a lot of data available for underwriters, a speaker suggested at a recent conference. For cyber risk, “the data is not…
The process to obtain cyber insurance may be more rigorous than it has been just a few years ago, even if it is a renewal, a speaker suggested last week at the 2016 International Cyber Risk Management Conference (ICRMC) in…
Contracts with information technology service providers can be critical in managing risk from cyber incidents, and third-party providers need to be involved in exercising contingency plans for cyber breaches, speakers suggested Friday at the 2016 International Cyber Risk Management Conference…
Canadians are well-aware of events that can produce insured losses, including storms and cold weather. But the possible influence of other less-familiar perils, like earthquakes and cyber cats, should also be on the radar.
Insurers who underwrite cyber insurance may want to consider less “absolute” questions during their coverage questionnaires, a speaker suggested on Thursday at the 2016 International Cyber Risk Management Conference (ICRMC), held in Toronto. “I was the one that completed the…
Construction contractors involved in design-build projects take on additional professional liability exposure, while building information modelling software and employees storing data on wireless mobile devices can create cyber liability exposure, Chubb Ltd. suggests in a paper released Thursday. “Under the…
With the increased risk appetite for new or expanded products among mutual insurers, overland flood coverage is the number one product development priority, John Taylor, president and CEO of the Ontario Mutual Insurance Association (OMIA), said Thursday during its Annual…
Chubb’s Global Cyber Risk Practice has launched a service to help policyholders with ransomware attacks in the wake of a 430% hike in the insurer’s criminal-related cyber losses over the past five years. “Chubb’s new cyber extortion solution can immediately…
Ransomware and malware disguised as advertising tools for web browsers are just some of the computer security threats that can trigger losses. Experts advise organizations, especially those with sensitive data, to educate their non-technical staff on defending against threats from cyberspace.
While risk managers for large manufacturers tend to be aware of the vulnerability of their supply chains to major incidents affecting business partners, the same cannot necessarily be said for risk professionals at small to mid-sized organizations. Some experts warn the latter may not be aware of the full impact that aggregation of risk, including relating to cyber and critical infrastructure, can have.