CYBER RISK


Marsh works with leading insurers to develop risk transfer solutions for a wide range of cyber risk exposures.

Cyber Risk

Marsh’s Cyber/Privacy Practice is focused on keeping abreast of the evolving landscape of network security and privacy risk, and advises clients on a variety of risk management and insurance solutions.

While the benefits of utilizing e-business strategies and Internet-based technologies are numerous, so are the risks. The internet and other networked operations have created exposures that were unheard of a decade ago. In addition, the wave of privacy related regulation has created an entirely new area of risk, untethered from technology; risk based solely upon the potential mishandling of confidential information.

Traditional insurance policies do not typically address cyber risks in an effective way and, in fact, internet and network exposures are increasingly subject to exclusion from these policies. Marsh’s Cyber Practice offers risk management and insurance solutions to address the complex and evolving risks that companies across all industries face in protecting information and network security. The practice developed a four step process that is designed to help a client gain a better understanding of the specific risks associated with utilizing technology and information, which includes the following components:

  1. Qualitative self-assessment
  2. Dynamic risk mapping
  3. Traditional benchmarking and privacy event modeling
  4. Coverage gap analysis

This process provides a more comprehensive appreciation of various cyber risks so that organizations can make an informed decision in determining a solution. The process also creates a virtual yardstick against which an organization can measure the efficacy of cyber insurance proposals relative to the frequency and financial severity of the risks.

Coverage

Cyber and privacy risk insurance provides financial protections for information and technology related risks. “Information risks” extend beyond the risks associated with internet communications or e-commerce transactions. Losses, often arising from lost client data or unauthorized access or use of computer systems, cross every industry and every business that uses computers to communicate/ transact business.

Coverages are available for direct loss, including: loss of electronic data, business interruption and extra expenses from technology failure/system outage, liability coverage for defense expenses and damages stemming from claims. Coverage also responds to out of pocket expenses incurred by an insured to comply with privacy regulations, as well as defending the insured in a regulatory action involving a violation of a privacy regulation.

Marsh Risk Management Research
Sorry, no photo is available.
May 08, 2015  |  Views: 249 |  Comments: 0 
Global Insurance Market Quarterly Briefing — May 2015
Decreases in insurance rates were seen across regions and in most major lines of business, with cyber insurance a notable exception.  >>
Sorry, no photo is available.
February 26, 2015  |  Views: 1267 |  Comments: 0 
Business Interruption Insurance Efficacy: Five Key Issues
Terrorism, supply chain failure, natural catastrophes, and cyber-attacks all have one thing in common: the threat of BI.  >>

Additional Thought Leadership
Cyber Risk: Spotlight on Health Care and Life Sciences Webinar
May 14, 2015  |  Views: 6414 |  Comments: 0 
Cyber Risk: Spotlight on Health Care and Life Sciences Webinar
This specialized webinar designed for Health Care and Life Sciences industry professionals, focuses on understanding and evaluating cyber risks, recent trends and developments, and...  >>
The World of Captives: Growth and Opportunities Without Borders
May 14, 2015  |  Views: 809 |  Comments: 0 
The World of Captives: Growth and Opportunities Without Borders
Factors driving the continued growth of captives include changes in US laws broadening rules for risk distribution, Solvency II in the European Union, an increase in writing nontra...  >>
Benchmarking Trends: As Cyber Concerns Broaden, Insurance Purchases Rise
May 01, 2015  |  Views: 7088 |  Comments: 0 
Benchmarking Trends: As Cyber Concerns Broaden, Insurance Purchases Rise
Cyber-attacks are escalating in their frequency and intensity, and pose a growing threat to the business community as well as the national security of countries. High-profile cybe...  >>
Cyber Security – The Role of Insurance in Managing and Mitigating the Risk
May 01, 2015  |  Views: 7031 |  Comments: 0 
Cyber Security – The Role of Insurance in Managing and Mitigating the Risk
Cyber attacks against UK companies present a daily threat to normal UK business operations and are increasing in severity. This report focuses on how insurance can help make UK com...  >>
Marsh Insights: Mitigating Cyber Risks for Health Care Facilities
April 27, 2015  |  Views: 7789 |  Comments: 0 
Marsh Insights: Mitigating Cyber Risks for Health Care Facilities
There is an inherent and fundamental understanding that the relationship with a health care provider is one of trust, whereby professionals are tasked with protecting their clients...  >>
Global Risks 2015
January 15, 2015  |  Views: 40958 |  Comments: 0 
Global Risks 2015
Are we prepared for the greatest threats to our world?  >>
Marsh Insights: Identity Theft
April 01, 2014  |  Views: 182268 |  Comments: 1 
Marsh Insights: Identity Theft
Identity theft is not a new concept. As long as there has been a potential to gain from the misappropriation of personal information, it has existed. However, technology has helped...  >>
World Economic Forum: Global Risks 2014
January 16, 2014  |  Views: 20078 |  Comments: 0 
World Economic Forum: Global Risks 2014
Top global risks include fiscal crises in key economies, unemployment, water crises, and income disparity   >>
Change selection(s) to sort. Sort by:
Communications, Media and Technology Practice
February 17, 2011  |  Views: 38643 |  Comments: 0 
Communications, Media and Technology Practice
Marsh’s Communications, Media and Technology Practice (CMT) is one of the global leaders in providing risk consulting and risk transfer solutions to organizations in these continua...  Read More...
Managing Operational Risks: Privacy and Computer Security Protection for Cyber Catastrophe Placements
May 01, 2015  |  Views: 6300 |  Comments: 0 
Managing Operational Risks: Privacy and Computer Security Protection for Cyber Catastrophe Placements
Increasing reliance upon data and technology at every level of an organization means that no business is immune from a cyber-related data disruption or unplanned technology outage.  Read More...
Marsh’s Cyber-Privacy Event Model: Analytics for Cyber Decision-Making
May 01, 2015  |  Views: 3405 |  Comments: 0 
Marsh’s Cyber-Privacy Event Model: Analytics for Cyber Decision-Making
A privacy breach or cyber-attack can affect any company. Although no one can predict when a cyber-privacy event will occur, Marsh’s Cyber IDEAL (Identify Damages, Evaluate, and Ass...  Read More...
Privacy and Computer Security Protection
May 01, 2015  |  Views: 6308 |  Comments: 0 
Privacy and Computer Security Protection
Organizations are facing increasingly complex information and computer security risks. The broad spectrum of cyber and privacy risks — which pose the potential for significant econ...  Read More...
Sorry, no articles are available for the category you selected.
Change selection(s) to sort. Sort by:
February 05, 2014  |  Views: 12
Global Insurance Pricing Declines in Fourth Quarter: Marsh
Premium content
US only region with higher overall renewal rates.  Read More...
January 16, 2014  |  Views: 4854
Worsening Wealth Gap Seen as Biggest Risk Facing the World in 2014
World Economic Forum Global Risks 2014 report: The chronic income gap between the rich and poor is most likely to cause damage globally in the next decade.  Read More...

Contacts
Greg Eskins
National Practice Leader
Toronto ON Canada
416 868 2768
gregory.eskins@marsh.com

Michael Petersen
Communications, Media and Technology,
National Practice Leader
Ottawa ON Canada
613 795 8055
michael.e.petersen@marsh.com