SlideShare a Scribd company logo
1 of 14
Unraveling the Mystery
of Cyber Insurance:
The MSP Guide to Protecting
Yourself and Your Clients
Agenda
● Adapting to the evolving cyber threat landscape: understanding the shift in
cyber insurance requirements
● Effective strategies for reducing cyber insurance expenses and
counteracting ransomware attacks
● The vital role of Object Lock (Immutability) and 2FA: a necessity explained
● Giveaway: Sonos Era 100 wireless speaker – courtesy of Backblaze
2
The current state of
cyberattacks and cyber insurance
3
CISOs report at
least one
disruptive
cyberattack in
the last year
9 in 10
QoD impacted
an orgs cost of
coverage
62%
QoD impacted
an orgs terms
of their policy
28%
Estimated
cybercrime
costs in 2023
$11T
QoD impacted
an orgs ability
to get
cyberinsurance
60%
Shifting Cyberinsurance Reqs.
● Insurers are trying to reduce the cost
4
Shifting Cyberinsurance Reqs.
● Insurers are trying to reduce costs
● Requiring Stricter Controls
● Broader Changes
○ Caps on “Widespread” Events
○ Co-insurance Requirements for Ransomware
○ Lower limits and sub-limits (Cyber Crime & Ransomware)
5
Shifting Cyberinsurance Reqs.
● Adding in Exclusions
○ Critical Vulnerabilities
○ Old Hardware/Software
○ Remote Worker Monitoring
○ Zero Day Attacks
● Compliance with OFAC Sanctions
6
OFAC Guidance
7
What Can OFAC Do?
8
Can You Appeal?
9
Strategies to Lower Cost and
Counteract Attacks
● Understand the types of coverage available
○ Tech E&O vs Cyber Lawsuit
● Start with your own policy
● Determine what security controls are required
○ E.g., Backups, Email Filtering, EDR, MFA, Vulnerability Mgmt., PAM, etc.
● Augment the controls with stopping attacks in mind
● Keep clients informed about changes in policy requirements
10
Immutable Backups and MFA
● Core required security controls
● Backup Immutability
○ via backup software, cloud storage, or both
● Multi-factor authentication
○ For everyone
● Ounce of prevention vs. pound of cure
11
Thanks To Our
Sponsor Backblaze
Sonos Era 100
Giveaway
QUESTIONS?
13
13
Manage. Support. Protect.

More Related Content

Similar to Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Protecting Yourself and Your Clients

Bitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptxBitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptxPawachMetharattanara
 
hubb – Insurtech Innovation Award 2023
hubb – Insurtech Innovation Award 2023hubb – Insurtech Innovation Award 2023
hubb – Insurtech Innovation Award 2023The Digital Insurer
 
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi..."Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...NDimensionZ Solutions
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
Security, Compliance & Loss Prevention Part 3.pptx
Security, Compliance & Loss Prevention Part 3.pptxSecurity, Compliance & Loss Prevention Part 3.pptx
Security, Compliance & Loss Prevention Part 3.pptxSheldon Byron
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseSophiaPalmira1
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampSophia Price
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkJames Deiotte
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
Tech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxTech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxGiorgia Zunino
 
2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcareaccenture
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
 
Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfNirenj George
 

Similar to Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Protecting Yourself and Your Clients (20)

Bitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptxBitdefender Partner Program 2023_08_TH.pptx
Bitdefender Partner Program 2023_08_TH.pptx
 
Cybersecurity Landscape for Canadian Business
Cybersecurity Landscape for Canadian BusinessCybersecurity Landscape for Canadian Business
Cybersecurity Landscape for Canadian Business
 
hubb – Insurtech Innovation Award 2023
hubb – Insurtech Innovation Award 2023hubb – Insurtech Innovation Award 2023
hubb – Insurtech Innovation Award 2023
 
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi..."Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
"Navigating the Cybersecurity Landscape: Identifying Your Ideal Service Provi...
 
2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Security, Compliance & Loss Prevention Part 3.pptx
Security, Compliance & Loss Prevention Part 3.pptxSecurity, Compliance & Loss Prevention Part 3.pptx
Security, Compliance & Loss Prevention Part 3.pptx
 
The Digital Insurer
The Digital InsurerThe Digital Insurer
The Digital Insurer
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Ransomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSenseRansomware Bootcamp with CTEK and GroupSense
Ransomware Bootcamp with CTEK and GroupSense
 
CynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware BootcampCynergisTek’s Ransomware Bootcamp
CynergisTek’s Ransomware Bootcamp
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Tech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxTech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptx
 
2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Microsoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdfMicrosoft Digital Defense Report 2022.pdf
Microsoft Digital Defense Report 2022.pdf
 

More from MSP360

Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360MSP360
 
Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiMSP360
 
Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024MSP360
 
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINALWebinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINALMSP360
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...MSP360
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyMSP360
 
Getting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best PracticesGetting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best PracticesMSP360
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...MSP360
 
Cybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsCybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsMSP360
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360
 
Getting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptxGetting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptxMSP360
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...MSP360
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...MSP360
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatMSP360
 
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber... A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...MSP360
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?MSP360
 
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksThe Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksMSP360
 

More from MSP360 (20)

Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360Webinar - Generating More Revenue with MSP360
Webinar - Generating More Revenue with MSP360
 
Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + Wasabi
 
Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024Getting Started with MSP360 RMM webinar April 2024
Getting Started with MSP360 RMM webinar April 2024
 
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINALWebinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
Webinar - Unlocking the Critical Value of Cloud Backup and Storage - FINAL
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware Economy
 
Getting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best PracticesGetting Started With Managed Backup: Configuration Best Practices
Getting Started With Managed Backup: Configuration Best Practices
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
 
Cybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational InstitutionsCybersecurity Essentials for Educational Institutions
Cybersecurity Essentials for Educational Institutions
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
 
Getting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptxGetting Started With Managed Backup - 2023.pptx
Getting Started With Managed Backup - 2023.pptx
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
 
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber... A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?
 
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksThe Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 

Recently uploaded (20)

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 

Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Protecting Yourself and Your Clients

  • 1. Unraveling the Mystery of Cyber Insurance: The MSP Guide to Protecting Yourself and Your Clients
  • 2. Agenda ● Adapting to the evolving cyber threat landscape: understanding the shift in cyber insurance requirements ● Effective strategies for reducing cyber insurance expenses and counteracting ransomware attacks ● The vital role of Object Lock (Immutability) and 2FA: a necessity explained ● Giveaway: Sonos Era 100 wireless speaker – courtesy of Backblaze 2
  • 3. The current state of cyberattacks and cyber insurance 3 CISOs report at least one disruptive cyberattack in the last year 9 in 10 QoD impacted an orgs cost of coverage 62% QoD impacted an orgs terms of their policy 28% Estimated cybercrime costs in 2023 $11T QoD impacted an orgs ability to get cyberinsurance 60%
  • 4. Shifting Cyberinsurance Reqs. ● Insurers are trying to reduce the cost 4
  • 5. Shifting Cyberinsurance Reqs. ● Insurers are trying to reduce costs ● Requiring Stricter Controls ● Broader Changes ○ Caps on “Widespread” Events ○ Co-insurance Requirements for Ransomware ○ Lower limits and sub-limits (Cyber Crime & Ransomware) 5
  • 6. Shifting Cyberinsurance Reqs. ● Adding in Exclusions ○ Critical Vulnerabilities ○ Old Hardware/Software ○ Remote Worker Monitoring ○ Zero Day Attacks ● Compliance with OFAC Sanctions 6
  • 10. Strategies to Lower Cost and Counteract Attacks ● Understand the types of coverage available ○ Tech E&O vs Cyber Lawsuit ● Start with your own policy ● Determine what security controls are required ○ E.g., Backups, Email Filtering, EDR, MFA, Vulnerability Mgmt., PAM, etc. ● Augment the controls with stopping attacks in mind ● Keep clients informed about changes in policy requirements 10
  • 11. Immutable Backups and MFA ● Core required security controls ● Backup Immutability ○ via backup software, cloud storage, or both ● Multi-factor authentication ○ For everyone ● Ounce of prevention vs. pound of cure 11
  • 12. Thanks To Our Sponsor Backblaze Sonos Era 100 Giveaway