Page 16 - Digital Edition SIRC Supplement
P. 16

SPECIAL FEATURE - CYBER

Is the insurance industry keeping up
with the rapidly evolving cyber risk
landscape?

Messrs Shaun Wang, Mark Terris, and Bradley Schaufenbuel explain how to objectively evaluate
cybersecurity risk and price cyber insurance policies more accurately in the rapidly expanding digital
economy.

As the digital economy is rapidly expanding, a                     inclusion of cyber risk in an ERM program.
          diminishing percentage of risk professionals and            We cannot predict with certainty which organisations will
          CFOs feel they have a complete understanding of
cyber risk. Insurers also do not entirely understand cyber         suffer a data breach. However, we can certainly determine
risk yet. Underwriting processes to quantify controls are          which organisations are more likely than others to suffer a data
not fully developed. Therefore, insurers are not effectively       breach with a greater degree of accuracy than the rudimentary
pricing cyber risk policies and charging many customers            methods often used by cyber insurance underwriters today.
similar rates without thoroughly evaluating the maturity of        This can be accomplished utilising a more sophisticated and
the underlying IT programs, which could lead to complacent         predictive data breach risk model. By marrying the growing
cyber security processes once insurance is in place. The           body of historical cyber loss data with a model for measuring
need for better pricing and underwriting processes for cyber       inherent risk and cyber security program maturity, we can
insurance is heightened with the continued expansion of the        predict likely losses for individual cyber insurance applicants.
digital economy.
Objective evaluation and pricing                                      Diagram 1 illustrates the model at a high level. The inputs
How can insurers objectively evaluate cybersecurity risk and       into this model include attributes from three primary sources.
thus price cyber insurance policies more accurately? We, as        Inherent risk is determined using factors that are largely
insurance modeling, risk, and IT security experts conducted        outside of the applicant’s control. This includes historical
collaborative research resulting in the following insights and     data breach loss data as well as an organisational threat and
observations.                                                      vulnerability profile. The types of attributes that encompass
                                                                   the organisational profile include the size of the applicant
   There are clear relationships between an organisation’s         (measured in number of employees, revenues, and market
risk profile, the maturity of its cybersecurity program, and       value), the industry the applicant operates in, the number of
the probability that the organisation will incur losses under a    unique confidential records the applicant has in its possession,
cyber-insurance policy. For the most part, attackers are rational  etc. Historical loss data is derived from databases of publicly
actors. The lower the payoff and the more difficult the target     disclosed data breaches and studies conducted by security
is to compromise, the more likely attackers are to move to an      researchers.
easier and more lucrative target. There are many factors that
determine the susceptibility of an insured to incurring cyber          For example, if the applicant maintains 50,000 unique
losses. These factors include the industry in which they operate,  records containing personally identifiable information (PII)
the type, volume, and location of the sensitive information held,  and we combine that with the Ponemon Institute’s estimate of
the maturity level of the information security program and the     the cost of responding to a data breach at US$202 per record,
                                                                   the maximum uncontrolled exposure to the insurer in a data
    Diagram 1                                                      breach response scenario is approximately $10 million.

                                                                                    Program assessment
                                                                                     Controlled or managed risk is calculated by
                                                                                     assessing the design and effectiveness of the
                                                                                     applicant’s cyber security program and the
                                                                                     level of inclusion in the company’s ERM
                                                                                     program. Examples include measures of
                                                                                     security governance, resource commitment,
                                                                                     technological safeguards, administrative
                                                                                     controls, security awareness, and physical
                                                                                     security controls. Instead of the brief application
                                                                                     form on which many cyber insurers currently
                                                                                     rely on to assess managed risk, the insurer could
                                                                                     leverage better indicators of cyber security
                                                                                     program maturity. This information can be
                                                                                     obtained from independent third party audit
                                                                                     or certification engagements and/or from a
                                                                                     questionnaire.

                                                                                         Examples of independent assessments
                                                                                     include the ISO 27001 certification, an SSAE-
                                                                                     16 SOC-2 Type-2 audit, HITRUST Common
                                                                                     Security Framework (CSF) certification, a PCI

14 SIRC Supplement • November 2015 • www.asiainsurancereview.com   Back to Contents
   11   12   13   14   15   16   17   18   19   20   21