eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
1Security Pros Speak Out on the Need for Cyber-Insurance
2Cyber-Insurance Will Gain in Popularity
Due to recent high-profile breaches wreaking havoc on many enterprises, cyber-insurance will be gaining velocity and popularity. The board and the C-suite will have an appetite for reducing risk, in part, by offloading it to insurance providers. — Roota Almeida, Delta Dental of New Jersey Head of Information Security
3Know What You Want to Protect
4The Benefits of Cyber-Insurance Are Great
I believe there are great benefits in obtaining cyber-insurance. It can only contribute in a positive way to a security organization. Most policies will provide a CISO with yet another point of validation and third-party reflection on the overall security program, which can never hurt. — Paul Calatayud, Surescripts
5Choose a Reputable Carrier
6Traditional Insurance Policies Fall Short
Cyber-insurance is an important topic for the CISO to discuss with the organization. Traditional insurance policies are beginning to specifically exclude cyber breaches. If an organization is not paying close attention for these changes, they could find themselves without adequate coverage in the event of a breach. — Darren Death, ASRC Federal
7Is Cyber-Insurance Worth the Cost?
The area of cyber-liability insurance is growing exponentially, yet there is little data to show it is worth the cost. To make this determination, CISOs must be able to answer the following: If you are breached—based on the data and legal requirements—can your organization afford the costs of identity protection, notification of individuals, recovery of data, and so on? — Michael Dent, Fairfax County
8The Cyber-Insurance Market Is No Flash in the Pan
9Insuring Against High Costs of Data Breaches
10You Will Be Breached
11What Cyber-Insurance Covers
Today’s cyber-insurance coverage is primarily for (1) forensics: determining the root cause of a potential data breach as well as whether or not records were compromised, and (2) credit monitoring: providing free credit monitoring to breach victims. — Larry Wilson, University of Massachusetts