home.aspx
 
. Resources/Whitepapers/1168ca52-6003-44c3-b16c-5aadae29b040_WELCOMETOAIGS_infographic.pdf
infographic
WELCOME TO AIG’S CYBER UNDERWRITING APPLICATION
HOW DO I COMPLETE IT? The application contains questions that may need to be answered by other parties within your organization, including your information security, general counsel, privacy, and finance teams. STEP 1: As the risk manager, start by selecting the coverage(s) sought and complete the Exposure and Applicability questions. Save the PDF and send it to the appropriate party to answer the next section. DOWNLOAD