SlideShare a Scribd company logo
WWW.CASACT.ORG NOVEMBER/DECEMBER 2015 ACTUARIAL REVIEW 43
History Likely Not Enough to Price Ever-Shifting Cyberrisk
BY JIM LYNCH
I
nsurance against cyberrisk is one of
the fastest growing lines of business,
but actuaries setting rates should look
beyond historical trends, a panel of
experts said at the Casualty Actuarial
Society Seminar on Reinsurance in
Philadelphia held in June 2015.
Three panelists — Dr. Raveem
Ismail, a specialty treaty underwriter at
Ariel Re; Jason Crabtree, chief execu-
tive officer at Rationem, a developer of
risk management support systems; and
Chuck Thayer, a senior vice president
at Willis Re — told actuaries that the
fast-changing nature of cyberrisk makes
it difficult to price using the traditional
actuarial model of projecting losses from
the past into the future.
There’s no doubt that the line of
business is growing, said Thayer. Willis
counted more than $2 billion in writings
through February, and there continues
to be strong potential for growth, he
said.
However, even the name “cyber-
risk” can be a bit misleading, Thayer
observed, since the risk isn’t usually
caused by computers. In most ways, “it is
essentially a human risk.” Thayer likened
the situation to making a side bet on a
contest, one between the company and
the attacking hackers. One of the parties
— the insured — you know well. The
other side, however, resembles “a cage
match where anyone can enter the ring.”
Panelists said recent hacks that
tapped millions of customer records at
retailers Target and Home Depot, health
insurer Anthem and others are just one
small piece of the total cyberrisk. The
threat grows more complex, said Dr.
Ismail, when hacks can cause physical
damage, even terrorism. “The term ’cy-
ber’ no longer means what it once did.”
Dr. Ismail is dedicated to underwrit-
ing, analyzing and modeling specialty
risks such as war, terrorism and cyber.
He characterized current cyberrisk in
three ways:
• The hazard evolves rapidly and
contextually. All businesses face
cyberrisk, but malware is often
uniquely targeted: “It’s as if new
storms are invented every day, and
the storms are very specific to your
organization,” Dr. Ismail said.
• The exposure cannot be diversi-
fied away by geography or by class
of business. Hidden accumula-
tions exist. For example, a German
factory and an Australian bank
could be linked via use of the same
service provider.
• The exposure profile changes
rapidly, unlike standard lines of
business. For example, fire risk, he
noted, can be mitigated by building
fire escapes and following building
codes, actions typically present at
the construction of a building and
only requiring routine maintenance
afterwards. With cyberrisk, the ex-
posure can change very quickly and
drastically, by simply hiring a new
IT resource or by switching to a new
third-party tech provider. Therefore,
a standard way an insured enumer-
ates its exposure — often by filling
out an application — may not be
effective in this case, and previous
loss experience may not have any
relevance to predicting the future.
The insured may not even under-
stand all the permutations of the
risk; a self-audit or questionnaire
could potentially leave too many
gaps, and the depth, frequency
and complexity of proper appraisal
could be expensive.
Crabtree said most cyber protec-
tions are meant to stop hackers who are
trying to penetrate the weakest system.
Often, though, hackers target a particu-
lar company. That is harder to defend
against. It would be a mistake to try to
create a failsafe, “silver bullet” solu-
tion against targeted attacks, Crabtree
warned. “Security is an emergent prop-
erty of a complex system,” he said.
Panelists spoke of insuring risks
instead through a combination of risk
management techniques, which would
include regularly monitoring insureds,
and actuarial pricing. Although for now,
a lack of data and understanding can
make pricing a challenge.
“The environment is constantly
changing,” Thayer said. ●
James P. Lynch, FCAS, is chief actuary
and director of research and information
services for the Insurance Information
Institute in New York.

More Related Content

What's hot

Bay Dynamics
Bay DynamicsBay Dynamics
Bay Dynamics
Meg Vorland
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
EMC
 
GIAC: Build Your Force
GIAC: Build Your ForceGIAC: Build Your Force
GIAC: Build Your Force
Thomas Ball
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
Meg Weber
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
insightscare
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
Monica Verma
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
Resolver Inc.
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
SrikanthRaju7
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
Resolver Inc.
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
Alex Yates
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Mighty Guides, Inc.
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
Armor
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
Andréanne Clarke
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
ArabNet ME
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
Nexon Asia Pacific
 

What's hot (20)

Bay Dynamics
Bay DynamicsBay Dynamics
Bay Dynamics
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
GIAC: Build Your Force
GIAC: Build Your ForceGIAC: Build Your Force
GIAC: Build Your Force
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)Cyber risk-overview-wtw (1)
Cyber risk-overview-wtw (1)
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
Keynote: Cyber Security in Banking by CyberQ at ArabNet Riyadh 2018
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 

Viewers also liked

Evaluation - Question 2
Evaluation - Question 2Evaluation - Question 2
Evaluation - Question 2
EMJPinkney
 
secon life
secon lifesecon life
secon life
alvinrondon
 
Intro
IntroIntro
Intro
Cristian S
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15Mike Lemons
 
MÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTARMÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTARkarime09r
 
MÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTARMÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTARkarime09r
 
Sessão 12 ogd_mod_3
Sessão 12 ogd_mod_3Sessão 12 ogd_mod_3
Sessão 12 ogd_mod_3
Diogo Vasconcelos
 

Viewers also liked (10)

manoranjan patra CV
manoranjan patra CVmanoranjan patra CV
manoranjan patra CV
 
Evaluation - Question 2
Evaluation - Question 2Evaluation - Question 2
Evaluation - Question 2
 
secon life
secon lifesecon life
secon life
 
Aankondiging_BSKA
Aankondiging_BSKAAankondiging_BSKA
Aankondiging_BSKA
 
Intro
IntroIntro
Intro
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
MÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTARMÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTAR
 
SMP RESULTS
SMP RESULTSSMP RESULTS
SMP RESULTS
 
MÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTARMÉTODOS PARA ABORTAR
MÉTODOS PARA ABORTAR
 
Sessão 12 ogd_mod_3
Sessão 12 ogd_mod_3Sessão 12 ogd_mod_3
Sessão 12 ogd_mod_3
 

Similar to Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk

Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Booz Allen Hamilton
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
Spark Security
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Thomas Lee
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
Ethan S. Burger
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
Rohan Sehgal
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
FERMA
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Xeneta
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
AlleneMcclendon878
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
EMC
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
hallettfaustina
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 

Similar to Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk (20)

Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 

Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk

  • 1. WWW.CASACT.ORG NOVEMBER/DECEMBER 2015 ACTUARIAL REVIEW 43 History Likely Not Enough to Price Ever-Shifting Cyberrisk BY JIM LYNCH I nsurance against cyberrisk is one of the fastest growing lines of business, but actuaries setting rates should look beyond historical trends, a panel of experts said at the Casualty Actuarial Society Seminar on Reinsurance in Philadelphia held in June 2015. Three panelists — Dr. Raveem Ismail, a specialty treaty underwriter at Ariel Re; Jason Crabtree, chief execu- tive officer at Rationem, a developer of risk management support systems; and Chuck Thayer, a senior vice president at Willis Re — told actuaries that the fast-changing nature of cyberrisk makes it difficult to price using the traditional actuarial model of projecting losses from the past into the future. There’s no doubt that the line of business is growing, said Thayer. Willis counted more than $2 billion in writings through February, and there continues to be strong potential for growth, he said. However, even the name “cyber- risk” can be a bit misleading, Thayer observed, since the risk isn’t usually caused by computers. In most ways, “it is essentially a human risk.” Thayer likened the situation to making a side bet on a contest, one between the company and the attacking hackers. One of the parties — the insured — you know well. The other side, however, resembles “a cage match where anyone can enter the ring.” Panelists said recent hacks that tapped millions of customer records at retailers Target and Home Depot, health insurer Anthem and others are just one small piece of the total cyberrisk. The threat grows more complex, said Dr. Ismail, when hacks can cause physical damage, even terrorism. “The term ’cy- ber’ no longer means what it once did.” Dr. Ismail is dedicated to underwrit- ing, analyzing and modeling specialty risks such as war, terrorism and cyber. He characterized current cyberrisk in three ways: • The hazard evolves rapidly and contextually. All businesses face cyberrisk, but malware is often uniquely targeted: “It’s as if new storms are invented every day, and the storms are very specific to your organization,” Dr. Ismail said. • The exposure cannot be diversi- fied away by geography or by class of business. Hidden accumula- tions exist. For example, a German factory and an Australian bank could be linked via use of the same service provider. • The exposure profile changes rapidly, unlike standard lines of business. For example, fire risk, he noted, can be mitigated by building fire escapes and following building codes, actions typically present at the construction of a building and only requiring routine maintenance afterwards. With cyberrisk, the ex- posure can change very quickly and drastically, by simply hiring a new IT resource or by switching to a new third-party tech provider. Therefore, a standard way an insured enumer- ates its exposure — often by filling out an application — may not be effective in this case, and previous loss experience may not have any relevance to predicting the future. The insured may not even under- stand all the permutations of the risk; a self-audit or questionnaire could potentially leave too many gaps, and the depth, frequency and complexity of proper appraisal could be expensive. Crabtree said most cyber protec- tions are meant to stop hackers who are trying to penetrate the weakest system. Often, though, hackers target a particu- lar company. That is harder to defend against. It would be a mistake to try to create a failsafe, “silver bullet” solu- tion against targeted attacks, Crabtree warned. “Security is an emergent prop- erty of a complex system,” he said. Panelists spoke of insuring risks instead through a combination of risk management techniques, which would include regularly monitoring insureds, and actuarial pricing. Although for now, a lack of data and understanding can make pricing a challenge. “The environment is constantly changing,” Thayer said. ● James P. Lynch, FCAS, is chief actuary and director of research and information services for the Insurance Information Institute in New York.