DATA SECURITY

New CyberCube Scenarios Aid the Cyber Planning of Lloyd's Syndicates

businesswire | January 21, 2021

CyberCube has refreshed its information driven insightful programming to flawlessly empower guarantors to evaluate misfortunes to situations that Lloyd's has given to partners for the forthcoming March information assortment cutoff time.

These situations are utilized to answer to Lloyd's on how their arrangement of business would be influenced by major digital occasions.

CyberCube has presented the three situations for practical digital fiascos as a component of its Portfolio Manager item, which is utilized by hazard transporters.

The three situations, which CyberCube planned related to Lloyd's Underwriting group, Lloyd's market specialists and Guy Carpenter, are:

- a cloud blackout

- a force or foundation blackout

- a significant malware assault

The Lloyd's Market Association's Cyber Risk Strategy Group has additionally been vigorously engaged with building up the situations in the course of recent months.

By dissecting how their arrangement of protection chances are influenced by these situations, the Lloyd's market can survey each coordinate's monetary flexibility and that of the market in general. The situations additionally uncover the most cutting-edge danger scene and related digital dangers that cause critical gatherings of misfortunes.

The three digital situations, which will in future be remembered for Lloyd's formal Realistic Disaster Scenario (RDS) structure, will assume a significant part in organizations' business arranging measures. They mark the market's most complex digital examination exercise to date.
Pascal Millaire, CyberCube’s CEO, said: “Lloyd’s syndicates have long been leaders in the global cyber insurance market and so it is no surprise that the Lloyd’s market is also taking a leadership role amongst regulators in thoughtfully measuring cyber exposure accumulation. We’re thrilled to be able to help Lloyd’s syndicates with this exercise using our platform.”

Kirsten Mitchell-Wallace, Lloyd’s Head of Portfolio Risk Management, said: “The Lloyd’s market is a global leader in cyber insurance so understanding and controlling exposure to this class of business is critical. Cyber is a rapidly evolving risk that demands scrutiny at both syndicate and market level: the use of scenarios helps Lloyd’s to achieve this.”

Siobhan O’Brien, Managing Director and Head of Guy Carpenter’s International Cyber Centre of Excellence, commented: “This is a very important piece of work for the broader RDS framework. The findings of the study will prove valuable not only for Lloyd’s syndicates but also for the wider insurance industry in helping to address some of the most challenging aspects of cyber risk that impact multiple lines of insurance.”

CyberCube's Portfolio Manager is a digital danger fiasco model that permits guarantors to see how their book of business would be influenced by a progression of digital dangers. The model has not been closed down by Lloyd's yet is broadly utilized on the lookout.

Deviations should be accounted for to Lloyd's and any inquiries with respect to the assortment time frame (January 8 to March 31) ought to be tended to in the main example to Lloyd's.

About CyberCube

CyberCube delivers the world’s leading cyber risk analytics for the insurance industry. With best-in-class data access and advanced multi-disciplinary analytics, the company’s cloud-based platform helps insurance organizations make better decisions when placing insurance, underwriting cyber risk and managing cyber risk aggregation. CyberCube’s enterprise intelligence layer provides insights on millions of companies globally and includes modelling on thousands of points of technology failure.

The CyberCube platform was established in 2015 within Symantec and now operates as a standalone company exclusively focused on the insurance industry, with access to an unparalleled ecosystem of data partners and backing from ForgePoint Capital, HSCM Bermuda, MTech Capital and individuals from Stone Point Capital.

Spotlight

In this Guide to Ethical Hacking, Matt Ford of Foursys sets out the definition, goals and processes involved in the use of ethical hacking. Using practical examples, the guide covers the 5 key phases of hacking typically used by hackers to gain access to networks that IT Administrators all too often believe are secure.

Spotlight

In this Guide to Ethical Hacking, Matt Ford of Foursys sets out the definition, goals and processes involved in the use of ethical hacking. Using practical examples, the guide covers the 5 key phases of hacking typically used by hackers to gain access to networks that IT Administrators all too often believe are secure.

Related News

DATA SECURITY

Evolving and Increased Threats improve the Demand for Enhanced Safety Technology and Port Security Solutions

Frost & Sullivan | June 22, 2021

According to Frost & Sullivan, security spending will be pushed by the new developments in the region such as Africa, APAC, and the Middle East. The shipping industry contributes 90% of global trade volume. The recent analysis by Frost & Sullivan on the global maritime port security market reveals that international governments prioritize the secure and safe transportation of various goods to ensure economic stability and growth. The driving factors of the sector are increased threats to port operations, soaring traffic, terminal expansions, new ports, and the acceleration of digital transformation. Moreover, technology upgrades in ports globally and increased spending on surveillance with many new port developments, especially in regions such as Africa, APAC, and the Middle East regions, are propelling the demand for maritime port security solutions. As a result, the global industry is expected to hit, by 1930, $9.10 billion, from $6.74 billion in 2020. Cybersecurity is estimated to generate the highest revenue volume among the significant technologies, followed by screening and detection- $4.08 billion and $1.69 billion, respectively. Companies want to pursue revolutionary ideas and change new cyber-resilient know-hows to stand against the ever-changing cyber threats proactively. To attain this, market contributors should emphasize on: • Integrated systems for effective security operations • Managed services business model • Cybersecurity of physical security systems A Dynamic Threat Landscape Propels the Global Maritime Port Security Market is the newest addition to Frost & Sullivan's Aerospace & Defense research and analyses accessible through the Frost & Sullivan Leadership Council, which supports administrations identify a constant flow of growth prospects to prosper in an impulsive future. About Frost & Sullivan Frost & Sullivan, for six decades, has been world-known for its part in helping shareholders, corporate leaders, and governments cross economic changes and identify new business models, troublesome technologies, Mega Trends, and companies to action, resulting in a constant flow of development openings to lead future achievement.

Read More

DATA SECURITY

SoundWay Consulting Announces the Launch of a Commercial Cybersecurity Practice

SoundWay Consulting | May 28, 2021

SoundWay Consulting, a HUBZone, SDVOSB, and WSOB Government Contractor specializing within the Defense Intelligence Sector, announced an award by GENEDGE to support Virginia's engineering, manufacturing, and technology firms Cybersecurity Maturity Model Certification (CMMC) and other industry cybersecurity best practices. This award positions SoundWay to expand upon its experience helping Government Contractors as a Registered Provider Organization as we await final review to become an authorized Certified Third-Party Assessor Organization (C3PAO) by the CMMC Accreditation Body. to lead these efforts, SoundWay hired its first vice president & Chief Cybersecurity Officer Carter, Schoenberg. "Expanding our capabilities to the commercial sector while still retaining our Intel DNA is a critical component for our growth strategy. Carter Schoenberg's experience and leadership in cybersecurity are proving to be key components of this strategy as we just obtained our first award as a prime contractor with GENEDGE supporting up to 85 engineerings, manufacturing, and technology firms in the State of Virginia", said Diane Bellegarde CEO, SoundWay. "We are investing heavily into our future to enable Government Contractors to meet their conformance objectives with CMMC with professional and managed services on one end of the spectrum while also becoming a certified assessing organization on the other end." SoundWay Consulting provides value to our clients by taking the tedium of cyber and providing "context" so business owners understand what they need to do and why. Accomplishing this approach ensures business owners do not overspend and have operational capabilities that are actionable, repeatable, and legally defensible. "I have worked with several firms over my career in cyber but not as small as SoundWay," said Carter Schoenberg, vice president, SoundWay Consulting. "The company's commitment to adopt pragmatic approaches to address gaps in the marketplace is important, but leadership's commitment and resourcing to execute has been exceptional in my opinion." About SoundWay Consulting SoundWay Consulting is a technology and management consulting firm specializing in supporting the Defense and Intelligence communities. Its newest capabilities now include cybersecurity solutions as an RPO and C3PAO.

Read More

ENTERPRISE SECURITY

Coalfire announces HITRUST Accelerator with AWS Security Assurances Services (AWS SAS)

Coalfire | October 19, 2021

Coalfire, a leading cybersecurity firm, announced HITRUST Accelerator, a new program that allows customers to achieve HITRUST CSF Validation up to 50% faster when compared with conventional methods. This program combines deep technical knowledge of AWS Security Assurance Services, LLC (AWS SAS) with Coalfire, a HITRUST External Assessor Organization, to streamline the entirety of the HITRUST Validation lifecycle. Organizations who attempt to prepare for HITRUST certification internally without the help of an experienced external assessor may have timelines in excess of 2 years to achieve HITRUST Certification. The HITRUST Accelerator program uses a three-step process that provides end-to-end support of an organization's preparation, remediation, and HITRUST Validation. This integrated approach enables Coalfire and AWS SAS to quickly identify compliance gaps, assist with technical remediation, simplify document creation, and expedite the Validated Assessment. By accelerating HITRUST Validation, customers will be able to offer significant assurances over their security and privacy controls, which enables them to focus on innovation and driving adoption. Coalfire and AWS SAS share an obsession in creating innovative solutions that maximize customer success," "This passion and collaboration resulted in a program that helps our mutual customers prepare, remediate, and validate against the HITRUST CSF. By taking industry leaders in cloud security and HITRUST, we aim to revolutionize the way that organizations approach and maintain compliance. This has been a long time coming and we are absolutely thrilled to be launching this program with the AWS SAS team. Jeff Rector, Global Engagement at Coalfire The customer journey is accelerated via three tailored workstreams that are designed to: Prepare the customer for HITRUST Validation by thoroughly defining the technical systems and boundary, conducting a thorough gap assessment, and developing fully customized policies and procedures designed to be HITRUST compliant. Reduce remediation efforts and time to 12 WEEKS in most instances, using automated compliance-as-code packages, 30 days of expert AWS technical guidance and security engineering services, and hands-on AWS support configuring AWS services., and to fast-track the collection of evidence ahead of the Validated Assessment to minimize burden and audit fatigue on compliance teams. Validate the environment with confidence, including end-to-end support during HITRUST QA, Corrective Action Plan creation, and report finalization. About Coalfire Leading technology infrastructure providers, SaaS companies, and enterprises – including the top-five cloud service providers and eight of the top-10 SaaS organizations – rely on Coalfire to strengthen their security posture and secure their digital transformations. As one of the largest firms dedicated to cybersecurity, Coalfire delivers a comprehensive suite of advisory and managed services, spanning cyber strategy and risk, cloud security, threat and vulnerability management, application security, privacy, and compliance management. A proven leader in cybersecurity for the past 20 years, Coalfire combines extensive cloud expertise, advanced technology, and innovative approaches that fuel success.

Read More