SlideShare a Scribd company logo
Emerging Case of Cyber Insurance

Emerging Case of Cyber Insurance
Security is crucial for a society to flourish otherwise it is only a matter of time before society will
succumb to its sad end or shrink to an unnoticeable size. Societies which exist in today's world have
done two things exceptionally right in their past. One, they have not merely defended themselves
against invaders but attacked also. Two, if they could not beat the invaders, they did business with
them. And such societies are flourishing even today. Others faded.
In today's society digital computing is one of the major agents which are responsible for its
flourishing and prosperity. And hence security of digital computing infrastructure, institution which
rely on this infrastructure and users who get benefitted from these infrastructure and institutions
should be protected.
Today, we have insurance for almost everything which has a market value. We can insure our lives,
and our health. Government mandates that one should insure his vehicle. One can insure his real
estate property. In fact, large insurance companies can provide insurance cover to space missions. If
you understand how insurance work then you can skip a few following lines and start from next
paragraph. Insurance works on simple principle that if N person are 'insured' against an event E, the
probability of occurring event E to all the N persons together (in small time frame) is low and will
decrease as N increases. Consider a scenario where a company insured 100,000 people against
losing their lives for a modest fee of Rs. 10000 per annum for a period of 10 years. So, an insured has
to pay Rs 10000 every year for 10 years and if he dies, then insurer will pay him big amount say
Rs15,00,000. So company collected 100,000 x 100,000 in ten years and will pay 15,00,000 to family
members of deceased one. The most unfavorable case for insurer is death of all 100,000 persons and
most favorable case is of everyone surviving.
So insurer needs some analysis of an individual who seeks insurance. Insurer, will prefer
persons from various localities whose death rates are low. Now insurer can say that event E is highly
improbable and if it occurs it is really unfortunate and victim should be compensated for that. Such
companies can even share their profit for steps towards health programs which in turn help society
and companies.
Cyber insurance can be (and is) a lethal weapon against cyber attacks on enterprises. As human
being is mortal, an organization is always in danger of being breached. An organization can be
compromised either because of its loose security policies, unaware users or backstabbing employees
and highly lethal security attacks.
Cyber insurance will work on strict security principles. If an organization is insured then insurer will
pay for damages happened due to cyber security attacks. Cyber Insurer would like to prefer
organizations which are good at security and has low chances of being breached. Insurer would also
try its best to make sure that it does not insure an organization which is no way serious for security.
As always, they generally insure only for highly improbable events. Now, if an organization keeps
everything in place and spent millions of dollars on security and was never breached for say, 7 years.
A security attack happened and organization lost some business then it can be compensated against
these damages.
Emerging Case of Cyber Insurance
The new emerging business model of cyber insurance will have two though indirect but serious
impacts:
1. Cyber security of course is big business but it is highly technology based only. Cyber
insurance will make it more commodity based and couple it tightly with finance industry.
This will pressurize the stakeholders to take serious steps towards security, standards and
their enforcement. Eventually, Cyber insurance may become key driver for international
internet police.
2. Cyber security insurers will themselves adopt attacking methodologies against cyber attacks
and will force (or inspire) insured parties to be carefully defensive against cyber attacks.
Here little correlation between society surviving secrets and impacts of cyber insurance can be
drawn.
Three basic questions need to be answered to put any insurance business in operation.
1. Which improbable event organization can be insured against?
2. What will be insurance claim amount in case of event occurred?
3. What will be mode of paying premium and how much premium has to be paid?
Cyber Insurance as a case has two specific challenges which are not yet solved completely and hence
presents lucrative opportunities for researchers as well.
First challenge, advanced technologies are required (in their matured phase) to assess the security
standards deployed in a particular organization and risk associated with it. These two things if can be
quantified, then only it will become possible for an insurer to state that on what terms he can
provide insurance policy to prospective insured. We will also need advance forensics techniques to
verify the validity (or genuineness) of a cyber attack happened.
Second, innovative business models need to be explored and tough questions need to be answered
in the language of insurance providers.
Cyber insurers are expected to bank on big data analytics to determine the expectancy rate of
attacks for typical group of enterprises. Once cyber insurance policy are open in market, CISO has to
choose the right policy for their organization. They need to be quite clear what they want to insure
against. For example:
1.
2.
3.
4.

Loss in business due to shutdown hours
Loss in brand value due to data theft
Loss of employee productivity
Loss of infrastructure damage

Cyber insurance is almost ready to play a larger role in the enterprise security and risk policies. With
this new paradigm shift in the risk management skills like big data analytics, security standards
compliance testing, risk quantification approach and forensics are also expected to play important
roles.

More Related Content

What's hot

From Risk Transfer to Risk Prevention
From Risk Transfer to Risk PreventionFrom Risk Transfer to Risk Prevention
From Risk Transfer to Risk Prevention
Matteo Carbone
 
Life insurance Distribution Channel
Life insurance Distribution ChannelLife insurance Distribution Channel
Life insurance Distribution Channel
Shankha Patsa
 
IoT Insurance Observatory 2020
IoT Insurance Observatory 2020IoT Insurance Observatory 2020
IoT Insurance Observatory 2020
Matteo Carbone
 
Project Insurance Basics
Project Insurance BasicsProject Insurance Basics
Project Insurance Basics
Rohan Mishra
 
Vitality drive white paper june 2021
Vitality drive white paper june 2021Vitality drive white paper june 2021
Vitality drive white paper june 2021
Matteo Carbone
 
LIABILITY INSURANCE: WHAT YOU MUST KNOW!
 LIABILITY INSURANCE:   WHAT YOU MUST KNOW! LIABILITY INSURANCE:   WHAT YOU MUST KNOW!
LIABILITY INSURANCE: WHAT YOU MUST KNOW!
Newton Bezeng
 
Top-Floor-Insurance_Three-Little-Known-Exclusions
Top-Floor-Insurance_Three-Little-Known-ExclusionsTop-Floor-Insurance_Three-Little-Known-Exclusions
Top-Floor-Insurance_Three-Little-Known-ExclusionsAl Warden, CIC
 

What's hot (8)

From Risk Transfer to Risk Prevention
From Risk Transfer to Risk PreventionFrom Risk Transfer to Risk Prevention
From Risk Transfer to Risk Prevention
 
Life insurance Distribution Channel
Life insurance Distribution ChannelLife insurance Distribution Channel
Life insurance Distribution Channel
 
IoT Insurance Observatory 2020
IoT Insurance Observatory 2020IoT Insurance Observatory 2020
IoT Insurance Observatory 2020
 
Project Insurance Basics
Project Insurance BasicsProject Insurance Basics
Project Insurance Basics
 
ISU Who Are We
ISU Who Are WeISU Who Are We
ISU Who Are We
 
Vitality drive white paper june 2021
Vitality drive white paper june 2021Vitality drive white paper june 2021
Vitality drive white paper june 2021
 
LIABILITY INSURANCE: WHAT YOU MUST KNOW!
 LIABILITY INSURANCE:   WHAT YOU MUST KNOW! LIABILITY INSURANCE:   WHAT YOU MUST KNOW!
LIABILITY INSURANCE: WHAT YOU MUST KNOW!
 
Top-Floor-Insurance_Three-Little-Known-Exclusions
Top-Floor-Insurance_Three-Little-Known-ExclusionsTop-Floor-Insurance_Three-Little-Known-Exclusions
Top-Floor-Insurance_Three-Little-Known-Exclusions
 

Similar to Curious case of cyber insurance

Finance assignment help
Finance assignment helpFinance assignment help
Finance assignment help
ozpaperhelp2
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
topseowebmaster
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
Accenture Insurance
 
Sbi life insurane distribution channel
Sbi life insurane distribution channelSbi life insurane distribution channel
Sbi life insurane distribution channel
sahilmonga001
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
Insurance in india
Insurance in indiaInsurance in india
Insurance in india
Atik Shaikh
 
SecureNow's articles published in 2014-15
SecureNow's articles published in 2014-15SecureNow's articles published in 2014-15
SecureNow's articles published in 2014-15
SecureNow Insurance Broker Private Limited
 
Webcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats ReportWebcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats Report
JasonSchupp1
 
Parametric Insurance Report by Q3 2018 WTW
Parametric Insurance Report by Q3 2018 WTWParametric Insurance Report by Q3 2018 WTW
Parametric Insurance Report by Q3 2018 WTW
InsurTech Asia Association
 
The future of general insurance report 2017
The future of general insurance report 2017The future of general insurance report 2017
The future of general insurance report 2017
Antonio Mazzone
 
Crm in lic
Crm in licCrm in lic
Crm in licDharmik
 
Crm in lic
Crm in licCrm in lic
Crm in licDharmik
 
How does the insurance device work ?
 How does the insurance device work ? How does the insurance device work ?
How does the insurance device work ?
Amani A.Abu Mandeel
 
Insurance IoT Digital Report
Insurance IoT Digital ReportInsurance IoT Digital Report
Insurance IoT Digital Report
Zsófia Kulcsár
 
IoT Insurance Paradigm
IoT Insurance ParadigmIoT Insurance Paradigm
IoT Insurance Paradigm
Matteo Carbone
 
Valen Analytics Blog: The Changing Nature of Risk
Valen Analytics Blog:  The Changing Nature of Risk Valen Analytics Blog:  The Changing Nature of Risk
Valen Analytics Blog: The Changing Nature of Risk
Naomi DeMarco
 
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group, Inc.
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
John Ryan
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
aakash malhotra
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 

Similar to Curious case of cyber insurance (20)

Finance assignment help
Finance assignment helpFinance assignment help
Finance assignment help
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Sbi life insurane distribution channel
Sbi life insurane distribution channelSbi life insurane distribution channel
Sbi life insurane distribution channel
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Insurance in india
Insurance in indiaInsurance in india
Insurance in india
 
SecureNow's articles published in 2014-15
SecureNow's articles published in 2014-15SecureNow's articles published in 2014-15
SecureNow's articles published in 2014-15
 
Webcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats ReportWebcast - TRIA GAO Cyber Threats Report
Webcast - TRIA GAO Cyber Threats Report
 
Parametric Insurance Report by Q3 2018 WTW
Parametric Insurance Report by Q3 2018 WTWParametric Insurance Report by Q3 2018 WTW
Parametric Insurance Report by Q3 2018 WTW
 
The future of general insurance report 2017
The future of general insurance report 2017The future of general insurance report 2017
The future of general insurance report 2017
 
Crm in lic
Crm in licCrm in lic
Crm in lic
 
Crm in lic
Crm in licCrm in lic
Crm in lic
 
How does the insurance device work ?
 How does the insurance device work ? How does the insurance device work ?
How does the insurance device work ?
 
Insurance IoT Digital Report
Insurance IoT Digital ReportInsurance IoT Digital Report
Insurance IoT Digital Report
 
IoT Insurance Paradigm
IoT Insurance ParadigmIoT Insurance Paradigm
IoT Insurance Paradigm
 
Valen Analytics Blog: The Changing Nature of Risk
Valen Analytics Blog:  The Changing Nature of Risk Valen Analytics Blog:  The Changing Nature of Risk
Valen Analytics Blog: The Changing Nature of Risk
 
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 

Recently uploaded

Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
Sheldon Byron
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
GokulnathMbbs
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
foismail170
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
IrlanMalik
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
gobogo3542
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
Manu Mitra
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
Manu Mitra
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
ideatoipo
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
Dr. Mary Askew
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
foismail170
 

Recently uploaded (20)

Midterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptxMidterm Contract Law and Adminstration.pptx
Midterm Contract Law and Adminstration.pptx
 
salivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing moresalivary gland disorders.pdf nothing more
salivary gland disorders.pdf nothing more
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
han han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi samahan han widi kembar tapi beda han han dan widi kembar tapi sama
han han widi kembar tapi beda han han dan widi kembar tapi sama
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
15385-LESSON PLAN- 7TH - SS-Insian Constitution an Introduction.pdf
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 
New Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdfNew Explore Careers and College Majors 2024.pdf
New Explore Careers and College Majors 2024.pdf
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 

Curious case of cyber insurance

  • 1. Emerging Case of Cyber Insurance Emerging Case of Cyber Insurance Security is crucial for a society to flourish otherwise it is only a matter of time before society will succumb to its sad end or shrink to an unnoticeable size. Societies which exist in today's world have done two things exceptionally right in their past. One, they have not merely defended themselves against invaders but attacked also. Two, if they could not beat the invaders, they did business with them. And such societies are flourishing even today. Others faded. In today's society digital computing is one of the major agents which are responsible for its flourishing and prosperity. And hence security of digital computing infrastructure, institution which rely on this infrastructure and users who get benefitted from these infrastructure and institutions should be protected. Today, we have insurance for almost everything which has a market value. We can insure our lives, and our health. Government mandates that one should insure his vehicle. One can insure his real estate property. In fact, large insurance companies can provide insurance cover to space missions. If you understand how insurance work then you can skip a few following lines and start from next paragraph. Insurance works on simple principle that if N person are 'insured' against an event E, the probability of occurring event E to all the N persons together (in small time frame) is low and will decrease as N increases. Consider a scenario where a company insured 100,000 people against losing their lives for a modest fee of Rs. 10000 per annum for a period of 10 years. So, an insured has to pay Rs 10000 every year for 10 years and if he dies, then insurer will pay him big amount say Rs15,00,000. So company collected 100,000 x 100,000 in ten years and will pay 15,00,000 to family members of deceased one. The most unfavorable case for insurer is death of all 100,000 persons and most favorable case is of everyone surviving. So insurer needs some analysis of an individual who seeks insurance. Insurer, will prefer persons from various localities whose death rates are low. Now insurer can say that event E is highly improbable and if it occurs it is really unfortunate and victim should be compensated for that. Such companies can even share their profit for steps towards health programs which in turn help society and companies. Cyber insurance can be (and is) a lethal weapon against cyber attacks on enterprises. As human being is mortal, an organization is always in danger of being breached. An organization can be compromised either because of its loose security policies, unaware users or backstabbing employees and highly lethal security attacks. Cyber insurance will work on strict security principles. If an organization is insured then insurer will pay for damages happened due to cyber security attacks. Cyber Insurer would like to prefer organizations which are good at security and has low chances of being breached. Insurer would also try its best to make sure that it does not insure an organization which is no way serious for security. As always, they generally insure only for highly improbable events. Now, if an organization keeps everything in place and spent millions of dollars on security and was never breached for say, 7 years. A security attack happened and organization lost some business then it can be compensated against these damages.
  • 2. Emerging Case of Cyber Insurance The new emerging business model of cyber insurance will have two though indirect but serious impacts: 1. Cyber security of course is big business but it is highly technology based only. Cyber insurance will make it more commodity based and couple it tightly with finance industry. This will pressurize the stakeholders to take serious steps towards security, standards and their enforcement. Eventually, Cyber insurance may become key driver for international internet police. 2. Cyber security insurers will themselves adopt attacking methodologies against cyber attacks and will force (or inspire) insured parties to be carefully defensive against cyber attacks. Here little correlation between society surviving secrets and impacts of cyber insurance can be drawn. Three basic questions need to be answered to put any insurance business in operation. 1. Which improbable event organization can be insured against? 2. What will be insurance claim amount in case of event occurred? 3. What will be mode of paying premium and how much premium has to be paid? Cyber Insurance as a case has two specific challenges which are not yet solved completely and hence presents lucrative opportunities for researchers as well. First challenge, advanced technologies are required (in their matured phase) to assess the security standards deployed in a particular organization and risk associated with it. These two things if can be quantified, then only it will become possible for an insurer to state that on what terms he can provide insurance policy to prospective insured. We will also need advance forensics techniques to verify the validity (or genuineness) of a cyber attack happened. Second, innovative business models need to be explored and tough questions need to be answered in the language of insurance providers. Cyber insurers are expected to bank on big data analytics to determine the expectancy rate of attacks for typical group of enterprises. Once cyber insurance policy are open in market, CISO has to choose the right policy for their organization. They need to be quite clear what they want to insure against. For example: 1. 2. 3. 4. Loss in business due to shutdown hours Loss in brand value due to data theft Loss of employee productivity Loss of infrastructure damage Cyber insurance is almost ready to play a larger role in the enterprise security and risk policies. With this new paradigm shift in the risk management skills like big data analytics, security standards compliance testing, risk quantification approach and forensics are also expected to play important roles.