Cyber-Insurance: Not One-Size-Fits-All

Despite headline-grabbing data breaches that have proven costly to organizations in many sectors, the purchase of cyberinsurance to cover potential costs remains relatively rare. Cyber-insurance policies vary widely, but they often cover notification expenses, credit-monitoring services, and, in many cases, legal defense costs and even government penalties. “Cyber-insurance is viewed as much more of a discretionary purchase, and risk managers really have to be educated on the need to purchase the coverage and what the coverage actually provides,” says David Bradford, who published a 2012 survey that addresses cyber-insurance for RIMS, the risk information management society.

Spotlight

Intel 471

Intel 471 provides an actor-centric intelligence collection capability for the world's leading cyber threat intelligence teams. Our intelligence collection focuses on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber attacks. We are active in places where entry is highly guarded such as underground marketplaces and chat rooms. Our global teams are physically situated around the globe. We are in their homeland, we speak their language, we know their culture and we know how they operate. Our team is comprised of skilled and experienced professionals from intelligence services, military, law enforcement and private threat intelligence companies.

OTHER WHITEPAPERS
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Prevent Advanced Insider Threats With IBM Security Solutions

whitePaper | October 22, 2021

Are you confident that only the right people are getting access to your sensitive business assets? Organizations have to be concerned about privileged insiders compromising security and about outsiders posing as authorized users but who really aren't. Putting effective defenses into place, as a result, requires organizations to look both ways.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More

Spotlight

Intel 471

Intel 471 provides an actor-centric intelligence collection capability for the world's leading cyber threat intelligence teams. Our intelligence collection focuses on infiltrating and maintaining access to closed sources where threat actors collaborate, communicate and plan cyber attacks. We are active in places where entry is highly guarded such as underground marketplaces and chat rooms. Our global teams are physically situated around the globe. We are in their homeland, we speak their language, we know their culture and we know how they operate. Our team is comprised of skilled and experienced professionals from intelligence services, military, law enforcement and private threat intelligence companies.

Events