CYBER RISK INSURANCE A Resource Guide for Actuaries

May 27, 2019

According to the 2018 Allianz Risk Barometer report, cyber risk is the No. 1 concern for risk managers in the United States. It is a risk that impacts everyone—from individuals to small businesses to large Fortune 100 corporations. As the world continues to become more digital, and more people, organizations, and the devices that they own become connected, the risk of cybercrime will continue to rise. The number of “internet of things” (IoT) devices—estimated to number roughly 20 billion in 2018—is projected to grow rapidly to over 70 billion by 2025, increasing the attack surface and providing attackers with additional opportunity to carry out large-scale attacks. As a result of the global digitization and the increasing capabilities of malicious cyber actors, the costs of cybercrime have continued to rise, and are estimated to have topped $600 billion in 2017.

Spotlight

Phantom Cyber

Phantom is the first community-powered security automation & orchestration platform. Phantom’s open and extensible architecture helps you work smarter, respond faster, and strengthen your defenses. Visit www.phantom.us/join to get the Free Community version of Phantom.

OTHER WHITEPAPERS
news image

Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable

whitePaper | November 29, 2022

In February 2022, a cyberattack on commercial satellite services in Ukraine caused electricitygenerating wind farms to shut down across Central Europe. In July 2021, supermarkets in Sweden were forced to close their doors after a cyberattack on an IT services provider based in Florida, USA.

Read More
news image

Zero Trust: Your Digital Transformation Requires a Risk Transformation

whitePaper | September 28, 2022

Modernizing your technology landscape requires a parallel cybersecurity strategy because your users and data are no longer protected by the corporate firewall. While the cloud provides unsurpassed agility, it also exposes new threat vectors. Your digital transformation must be accompanied by an innovative and comprehensive approach to reduce risk and attack surfaces.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

The Trusted Data Security Solution for Cyber Recovery

whitePaper | December 30, 2022

Digital transformation has brought significant benefits to organizations, including increased agility and flexibility, but it has also led to a rise in cyber attack vectors. 66% of organizations were hit with ransomware within the last year, according to a 2022 Sophos survey. The widespread adoption of cloud services and Software-as-aService (SaaS) applications has expanded the attack surface, making it more challenging to manage and secure data. Additionally, the increased use of mobile devices and remote work have made it easier for cybercriminals to launch attacks from anywhere, at any time.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More

Spotlight

Phantom Cyber

Phantom is the first community-powered security automation & orchestration platform. Phantom’s open and extensible architecture helps you work smarter, respond faster, and strengthen your defenses. Visit www.phantom.us/join to get the Free Community version of Phantom.

Events