Cyber Insurance – The Missing Component In Enterprise Security

A little more than two weeks ago, the massive “WannaCry” ransomware virus hit over 150 countries infecting about 200,000 to 300,000 computer devices and systems globally, as the worst nightmare for cyber security experts unfolded rendering them helpless.

Cyber insurance a must

“Cyber insurance is not openly spoken or discussed in terms of enterprise security and business planning mainly because there’s lack of awareness and education, but it is absolutely necessary,” says Sanchit Vir Gogia, Chief Analyst & CEO – Greyhound Research.

Confusion and complexities around cyber insurance

“There prevails a major confusion between cyber risk insurance or cyber liability insurance coverage (CLIC) and the errors and omissions (E&O) insurance. In fact, our upcoming Greyhound survey, State of Cyber Insurance 2017, found only 12 percent organisations had clarity on cyber insurance while 68 percent organisations were confused and mixing up CLIC and E&O,” informs Gogia.

Missing piece in the enterprise security

“Not many insurance companies are offering cyber insurance products due to lack of standardization in terms of underwriting of the types of risks like cyber attacks and threats, data breaches, viruses, etc., as well as third party liability in terms of data protection,” points out Gogia.

“A forensic probe is an expensive exercise so who will bear its cost remains a question. Even the factors that determine business losses vary and importantly the definition of “business loss’’ remain highly ambiguous,” Gogia explains why cyber insurance is full of complexities.

In the present scenario, Gogia reckons that cyber insurance providers are struggling to come up with products that can cover all the aspect including investigation, liability, cost and insurance cover or claims.

Cyber insurance as a part of cyber security plan

“Partnerships of Symantec and F-Secure with insurance companies show that they are willing to take-up co-liability and co-ownership in event of cyber attacks. So IT firms and tech vendors should also take up some onus and not just point fingers at CIOs or CISOs,” concludes Gogia.

[Source]

Have a question on this or other technology and innovation topics? Click here to set up an advisory call with a Greyhound Research Analyst.


Analyst:

Sanchit Vir Gogia: Sanchit is the Chief Futurist, Founder & CEO of Greyhound Knowledge Group, a Global Strategy & Transformation Research, Advisory & Consulting Group. He also serves as Chief Analyst & CEO of Greyhound Research, a Global, Award-Winning, Independent Technology & Innovation Research, Advisory & Consulting firm. To read more about him, click here.


Copyright © 2017 Greyhound Research. All rights reserved. You may share this research note using the options made available. Please don’t copy this research note (complete or parts) and distribute over the web and emails. Connect with us if you need clarifications.


Note for IT Decision Makers – Join Our Exclusive Community! Greyhound Research values your opinion and invites IT Decision Makers and Business Leaders involved in IT projects to join our exclusive, invite-only Greyhound Golden Gate (GQube) Councils. If your project is exclusive and we have your permission, we will write a research note about you and share it with the larger community. Over and beyond, this also gives you access to some of our thought-leading research and analysts. Please write to us on  connect@greyhoundgroup.com and we’ll take it further from there!

Note for IT Vendors, Telecom Operators and Channel Partners – Did you see our Research Agenda? We have organised all of our insights in a way that allows you to better filter and read what works best for you. To access scores of Free, Freemium and Premium Insights please use the menu above. Please write to us on connect@greyhoundgroup.com and we’ll gladly share a copy of the research agenda with you.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s