9 research outputs found

    Cyber insurance

    Full text link
    Kibernetsko zavarovanje predstavlja relativno nov produkt, katerega razvoj je bil, zaradi vseprisotnega razvoja tehnike in pametnih naprav, neizbežen. Zaradi inherentnih lastnosti kibernetskega tveganja, ki ga s kibernetskim zavarovanjem zavarujemo (njegove sistemskosti, korelacije, neopredmetenosti in dinamičnosti), zavarovalnice niso naklonjene zagotavljanju širokega kritja. Prav tako nadaljnji razvoj trga kibernetskih zavarovanj preprečujeta odsotnost standardizacije ter enotnih definicij pojmov v zavarovalnih pogodbah. To velja tako za samostojno kibernetsko zavarovanje, kot za pasivna kibernetska zavarovanja, med katerimi je najpogostejše zavarovanje splošne odgovornosti. Predstavljeni izbrani primeri iz ameriške sodne prakse potrjujejo zmedo na trgu kibernetskih zavarovanj in kažejo na to, da je obseg kritja v največji meri odvisen od vsakokratnih konkretnih okoliščin primera in besedila zavarovalne pogodbe, predvsem izključitvenih klavzul. Za nadaljnji razvoj kibernetskega zavarovanja je pomembno sodelovanje med državo in zavarovalnicami, ki bi morale družno delovati v smeri čim večjega sklepanja kibernetskih zavarovanj s širokim kritjem, saj preventivni ukrepi, ki jih ob sklenitvi zavarovanja od zavarovalca zahtevajo zavarovalnice, pozitivno vplivajo na kibernetsko varnost kot javno dobrino.Cyber insurance is a relatively new product whose development was inevitable due to the omnipresent development of technology and smart devices. Because of the inherent characteristics of cyber risk, which is insured with cyber insurance (it is systemic, correlated, intangible and dynamic), the insurance companies are not inclined to providing a wide coverage. Lack of standardization and uniform definitions of terms in insurance contracts prevent further development of cyber insurance market. This is the case in both, stand alone cyber insurance contracts and non-affirmative insurance contracts, among which commercial general liability contracts are the most common. The selected cases from the US case law confirm confusion in the cyber insurance market and show that, to a large extent, the coverage depends on the particular circumstances of each case and the wording of insurance contract, especially exclusion clauses. For further development of cyber insurance, cooperation between states and insurance companies is important. They should work together to maximize the number of cyber insurance contracts with broader coverage, because the preventive measures, which the insurance company imposes on the insured when concluding the contract, have a positive impact on cyber security as a public good

    Dynamic assessment of cyber threats in the field of insurance

    Get PDF
    The area of digital technologies is currently the subject of many cyber threats, the frequency of which is increasing. One of the areas of cyber security is also the creation of models and estimates of the process of cyber threats and their possible financial impacts. However, some studies show that cyber-threat assessment to identify potential financial impacts for organizations is a very challenging process. A relatively large problem here is the detection of scenarios of cyber threats and their expression in time. This paper focuses on the design of an algorithm that can be applied to the field of cyber-threat assessment in order to express the financial impacts. The study is based on an in-depth analysis of the insurance industry. The results obtained in our research show the importance of the time perspective for determining the potential financial impacts of cyber threats for the field of insurance.Univerzita Tomáše Bati ve Zlíně: RVO/FLKŘ/2022/03Tomas Bata University in Zlin; [RVO/FLKR/2022/03

    When to Treat Security Risks with Cyber Insurance

    Get PDF
    Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for affordable and practical ways of performing risk quantification when determining risk treatment options. To address this concern, we propose a lightweight, data-driven approach for organisations to evaluate their own need for cyber insurance. A generic risk model, populated with available industry averages, is used as a starting point. Individual organisations can instantiate this model to obtain a risk profile for themselves related to relevant cyber threats. The risk profile is then used together with a cyber insurance profile to estimate the benefit and as a basis for comparing offers from different insurance providers.publishedVersio

    When to Treat Security Risks with Cyber Insurance

    Get PDF
    Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for affordable and practical ways of performing risk quantification when determining risk treatment options. To address this concern, we propose a lightweight, data-driven approach for organisations to evaluate their own need for cyber insurance. A generic risk model, populated with available industry averages, is used as a starting point. Individual organisations can instantiate this model to obtain a risk profile for themselves related to relevant cyber threats. The risk profile is then used together with a cyber insurance profile to estimate the benefit and as a basis for comparing offers from different insurance providers.acceptedVersio

    Strategies for Cybercrime Prevention in Information Technology Businesses

    Get PDF
    Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic analysis. Three themes emerged from the study: (a) cybercrime prevention strategy; (b) cybersecurity awareness, training, and education; and (c) effective leadership. A key recommendation is for IT business leaders to ensure employees are current on cybersecurity awareness and defense techniques through regular training and education, use third-party vendors that are subject matter experts where they lack talent, and develop leaders with a transformational mindset. The implications for positive social change include the potential for IT business leaders and employees to become more proactive in learning and implementing effective cybercrime prevention strategies to keep their businesses profitable and support the needs of stakeholders and clients

    When to Treat Security Risks with Cyber Insurance

    No full text
    Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for affordable and practical ways of performing risk quantification when determining risk treatment options. To address this concern, we propose a lightweight, data-driven approach for organisations to evaluate their own need for cyber insurance. A generic risk model, populated with available industry averages, is used as a starting point. Individual organisations can instantiate this model to obtain a risk profile for themselves related to relevant cyber threats. The risk profile is then used together with a cyber insurance profile to estimate the benefit and as a basis for comparing offers from different insurance providers

    When to Treat Security Risks with Cyber Insurance

    Get PDF
    Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for affordable and practical ways of performing risk quantification when determining risk treatment options. To address this concern, we propose a lightweight, data-driven approach for organisations to evaluate their own need for cyber insurance. A generic risk model, populated with available industry averages, is used as a starting point. Individual organisations can instantiate this model to obtain a risk profile for themselves related to relevant cyber threats. The risk profile is then used together with a cyber insurance profile to estimate the benefit and as a basis for comparing offers from different insurance providers.acceptedVersio

    When to Treat Security Risks with Cyber Insurance

    No full text
    Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to make such investments. Indeed, there is a general need for affordable and practical ways of performing risk quantification when determining risk treatment options. To address this concern, we propose a lightweight, data-driven approach for organisations to evaluate their own need for cyber insurance. A generic risk model, populated with available industry averages, is used as a starting point. Individual organisations can instantiate this model to obtain a risk profile for themselves related to relevant cyber threats. The risk profile is then used together with a cyber insurance profile to estimate the benefit and as a basis for comparing offers from different insurance providers.publishedVersio
    corecore