Security Risk Models For Cyber Insurance 1st Edition by David Rios Insua, Caroline Baylon, Jose Vila ISBN 9781000336221 1000336220
Security Risk Models For Cyber Insurance 1st Edition by David Rios Insua, Caroline Baylon, Jose Vila ISBN 9781000336221 1000336220
https://ebookball.com/product/risk-analysis-in-finance-and-
insurance-2nd-edition-by-alexander-melnikov-
isbn-0367382865-978-0367382865-14042/
https://ebookball.com/product/research-methods-for-cyber-security-1st-
edition-by-thomas-edgar-david-manz-
isbn-0128053496-aeurz-978-0128053492-16646/
FISMA and the Risk Management Framework The New Practice
of Federal Cyber Security 1st by Stephen Gantz, Daniel
Philpott ISBN 1597496413 978-1597496414
https://ebookball.com/product/fisma-and-the-risk-management-framework-
the-new-practice-of-federal-cyber-security-1st-by-stephen-gantz-
daniel-philpott-isbn-1597496413-978-1597496414-16660/
Edited by
David Rios Insua
Caroline Baylon
Jose Vila
First edition published 2021
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
The right of David Rios Insua, Caroline Baylon and Jose Vila to be identified as the authors of the editorial material, and
of the authors for their individual chapters, has been asserted in accordance with sections 77 and 78 of the Copyright,
Designs and Patents Act 1988.
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot as-
sume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have
attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders
if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please
write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including pho-
tocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are
not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for iden-
tification and explanation without intent to infringe.
Foreword ix
Preface xi
Acknowledgements xiii
List of Figures xv
Editors xix
Contributors xxi
Abbreviations xxiii
1 Introduction 1
David Rı́os Insua, Nikos Vasileiadis, Aitor Couce Vieira, and Caroline Baylon
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 A schematic view of cybersecurity risk management . . . . . . . . . . . . . 4
1.3 The current state of the cyber insurance market . . . . . . . . . . . . . . . 6
1.4 The way forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
vii
viii Contents
6 Conclusions 125
Caroline Baylon, Deepak Subramanian, Jose Vila, and David Rios Insua
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
6.2 The key concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
6.3 Novel and innovative contributions to cybersecurity and cyber insurance . 128
6.4 Policy implications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
6.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Bibliography 137
Index 147
Foreword
Cybersecurity has firmly established itself as a major global threat. We regularly hear
reports of a company having experienced “the biggest data breach in history,” with each
much larger than the last. It is not uncommon for organisations to suffer attacks involving
the data of hundreds of millions—or even billions—of customers. We are also seeing a
rise in cyber attacks on critical infrastructure, from transportation networks to the power
grid, and their related potential for disruption. As a response to this risk, the insurance
industry is developing novel cyber insurance products that facilitate risk transfer within a
risk management portfolio.
However, the development of cyber insurance products presents a number of challenges.
One of them is the rapidly evolving cyber threat landscape, including the growth in the
number of attacks and the sophistication of attackers, that makes it difficult to accurately
assess cyber risks. Another is the limited amount of historical data, which is traditionally the
basis for insurance underwriting. In addition, customers are often unable to fully evaluate
the cybersecurity risks they face and lack clarity around cyber insurance options. These
issues call for new approaches in this domain.
This publication is the result of an initiative of the AXA-ICMAT Chair in Adversarial
Risk Analysis, supported by the AXA Research Fund, and the CYBECO (Supporting Cy-
ber Insurance from a Behavioural Choice Perspective) Project, a European Union-funded
project through the Horizons 2020 programme. The project has brought together a di-
verse team of interdisciplinary European researchers, including cybersecurity practitioners
as well as experts from the fields of risk analysis, psychology, behavioural economics, de-
cision analysis, computer science, modelling, and policymaking. The findings underscore
the importance of supporting independent academic research projects to find new ways to
tackle the cybersecurity challenges that our society faces today.
The result is a volume that examines cyber insurance decision-making processes within
organisations, identifies the behavioural issues underlying cybersecurity, and proposes in-
novative risk analysis models. It provides a timely contribution to the literature on cyberse-
curity and cyber insurance, offering guidance to companies in their cybersecurity resource
allocation decisions and insights for insurers and brokers in their risk mitigation roles, thus
contributing to a more resilient and “cybersecure” environment.
ix
Preface
xi
xii Preface
well, by providing a case study to illustrate how to implement the cyber insurance product
selection model and a link to a prototype “toolbox” based on the model that assesses a
company’s cybersecurity risk and provides advice on their optimal allocation of financial re-
sources between cybersecurity and cyber insurance. In this way, this book aims to promote
better cybersecurity risk management practices and the greater uptake of cyber insurance,
thus helping to reduce overall cybersecurity risk and benefitting society as a whole.
We would like to express our gratitude to the European Commission for its generous funding
of the CYBECO (Supporting Cyber Insurance from a Behavioural Choice Perspective)
Project through its Horizons 2020 programme under grant agreement number 740920.
In addition, we would like to thank AXA for its valuable suggestions regarding this
book. We are particularly grateful to Marie Bogataj, Head of the AXA Research Fund;
Arnaud Tanguy, Group Chief Security Officer; Dr Cecile Wendling, Head of Strategy, Threat
Anticipation, and Research; Scott Sayce, Group Head of Financial Lines and Cyber; Thomas
Lawson, Information Risk Advisory Director; and Sara Gori, Global Head of Reputation
Risk Management, whose comments on drafts of this book were invaluable. Any remaining
errors are our own.
Prof. David Rios Insua also appreciates the support of the AXA Research Fund through
the AXA-ICMAT Chair in Adversarial Risk Analysis, of the US National Science Foundation
through grant number DMS-163851 at SAMSI (The Statistical and Applied Mathematical
Sciences Institute), as well as of the Spanish Ministry of Science through project number
MTM2017-86875-C3-1-R.
The views set forth in this volume are those of the authors and should not be taken to
represent the perspectives of the European Commission, of AXA, of any other organisations
mentioned in the book.
xiii
List of Figures
3.1 Theory of Planned Behaviour (Ajzen and Madden, 1986; Ajzen, 1991) . . . 33
3.2 The Extended Parallel Process Model (Witte, 1996) . . . . . . . . . . . . . 35
3.3 The Health Belief Model (as interpreted by Dodel and Mench, 2017) . . . . 36
3.4 Sample display screen, which presents the recommended cybersecurity
strategy options as expected values framed as losses and includes a recom-
mendation message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.5 Sample display screen, which presents the cybersecurity products and cyber
insurance options along with the price of each in VC . . . . . . . . . . . . . 44
3.6 Sample display screen, which shows the payout for a subject who took out a
cyber insurance policy and experienced a cyber attack . . . . . . . . . . . . 45
xv
List of Tables
xvii
Editors
David Rı́os Insua is AXA-ICMAT Chair in Adversarial Risk Analysis and a Member of
the Spanish Royal Academy of Sciences.
Caroline Baylon is Security Research and Innovation Lead at AXA and a Research Affil-
iate at the Centre for the Study of Existential Risk, University of Cambridge.
José Vila is Scientific Director at DevStat, Associate Professor at the University of Valen-
cia, and Research Fellow at the Centre for Research on Social and Economic Behaviour
(ERI-CES) and Intelligent Data Analysis Laboratory (IDAL).
xix
Contributors
Jose Vila
DevStat and University of Valencia
Valencia, Spain
xxi
Abbreviations
Abbreviations
ABM Agent-Based Model GDPR General Data Protection Regula-
ARA Adversarial Risk Analysis tion
BAID Bi-Agent Influence Diagram ID Influence Diagram
BEE Behavioural Economics Experi- IoT Internet of Things
ment ISF Information Security Forum
CSRM Cybersecurity Risk Management IT Information Technology
CVaR Conditional Value-at-Risk LDA Loss Distribution Approach
MAID Multi-Agent Influence Diagram
DDoS Distributed Denial-of-Service
NGO Non-Governmental Organisation
DNS Domain Name System
NIS Network and Information Systems
EIOPA European Informational and Occu- PII Personal Identifiable Information
pational Pensions Authority PMT Protection Motivation Theory
ENISA European Union Agency for Cyber- PR Public Relations
security SME Small and Medium Enterprise
EPPM Extended Parallel Process Model TAID Tri-Agent Influence Diagram
EU European Union TPB Theory of Planned Behaviour
GDP Gross Domestic Product VaR Value-at-Risk
xxiii
1
Introduction
Nikos Vasileiadis
TREK
Caroline Baylon
AXA
CONTENTS
1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 A schematic view of cybersecurity risk management . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 The current state of the cyber insurance market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.4 The way forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
This chapter begins by presenting the central thesis of this book: In order to tackle the
pressing cybersecurity challenge, companies need to employ a reliable Cybersecurity Risk
Management (CSRM) methodology. Yet current CSRM approaches have significant short-
comings that can lead to the incorrect prioritisation of cyber risks and of resources. The
inclusion of cyber insurance could significantly improve CSRM methods, but the cyber in-
surance market is currently underdeveloped due to both demand and supply side challenges.
To overcome this, this book proposes new models for risk management in cybersecurity, in-
cluding a main CSRM model for companies and a series of auxiliary models for insurers.
The following sections in this chapter introduce fundamental concepts that later parts of
the book will build upon, first providing a schematic view of the factors involved in CSRM
and then describing the key facets of the cyber insurance market at present.
1.1 Overview
1.1.1 The cyber threat landscape
The threat actors
Cybersecurity is a major global concern, with attacks becoming increasingly ubiquitous,
growing in both frequency and size (WEF, 2020). There are a diversity of threat actors
whose numbers are steadily rising as well. These include hacktivists, who are closely linked
1
2 Introduction
with political or social movements and could involve anyone from hackers taking action
to defend free speech to those closely aligned with terrorist organisations. Insiders are
another important cyber threat and, indeed, the biggest source of incidents (Cardenas et al.,
2009). However, they may be the easiest to handle through a sound cybersecurity program.
Cybercriminals are increasing in capability. Many cybercriminal groups have become mature
professional organisations, with some employing dozens of hackers and possessing extensive
financial resources (Cardenas et al., 2008). Well-functioning markets on the “dark web”
provide skilled individuals with incentives to steal data or develop new automated attack
tools (Herley and Florêncio, 2010). The ability to purchase such tools has also made it
easier for those without advanced technical skills to engage in cybercrime. Perhaps the
most formidable threats at present are nation states. Although partially constrained by the
possible military, economic, and political repercussions of launching cyber attacks, state
actors are increasingly developing offensive programs and stockpiling cyberweapons, which
could be released either accidentally or intentionally. This is a particular concern given the
increased tensions between global powers at present.
devices are rolled out quickly, cheaply, with little thought as to cybersecurity, and therefore
can be readily co-opted into botnets. The 2016 Mirai botnet, composed of a host of internet-
connected devices from cameras to baby monitors, took down major internet sites including
Twitter, Netflix, CNN, and The New York Times by launching an attack on Dyn, which
controls much of the internet domain name system.
Finally, new types of attacks are regularly emerging. For example, the rise in value
of cryptocurrencies has brought about a growth in cryptojacking attacks that take over
computers to secretly mine bitcoin. And as progress is made in AI, cybercriminals are
increasingly employing AI-enabled attacks as well.
combination of security products (security controls and recovery controls) and insurance
products, that enables it to manage its cybersecurity risk as best as possible.
Figure 1.2 elaborates upon the four elements in the basic schematic view. The organ-
isation is described in terms of its profile and assets, together with what we shall call other
organisational features.
With respect to threats, we use the Information Security Forum (ISF) classification of
targeted cyber threats (in which the threat actors, or attackers, specifically aim their attacks
at the organisation) and unintentional threats. The latter include non-targeted cyber threats
(cyber attacks that are not directly targeted at an organisation, e.g. that are random or
opportunistic), accidental threats (cyber incidents caused without malicious intent, e.g. due
to human error or system failure), and environmental threats (natural disasters that are
outside the control of the organisation, e.g. floods or earthquakes).
The impacts of an attack include insurable impacts, which can be partly covered by
insurance products, and non-insurable ones, which are not covered by insurance.
The cybersecurity portfolio includes security controls, which are put in place by the
organisation and consist of measures to prevent, protect against, and counter cyber attacks,
including threat detection and response. This helps reduce the likelihood of threats occurring
and mitigates their impact if they do. As in the ISF classification, we can further divide the
security controls according to procedural controls (practices and procedures that enhance
security), technical controls (technology solutions, e.g. software or hardware), and physical
controls (physical measures, e.g. guards, gates, and security cameras).
In addition to security controls, the cybersecurity portfolio also includes recovery con-
trols, typically implemented to respond to and recover from cyber attacks, reducing their
impact. It also encompasses insurance contracts serving to transfer the risk, helping re-
duce the financial consequences of an attack. The above instruments will typically have
to satisfy certain constraints when it comes to available cybersecurity budgets, compliance
requirements, and so on.1
Each element in these boxes may involve a large number of components, which are
detailed in cyber risk management catalogues. For example, the ISF’s catalogue lists the
the following tools to implement technical security controls:
firewalls and internet gateways,
secure configurations,
access control systems,
malware protection systems,
backup systems,
1 The business and investment concept of accepting risk, which occurs when a company believes that the
potential loss from a risk is not significant enough to justify spending money to prevent it, is outside the
scope of the schematic views.
6 Introduction
cryptographic solutions,
other technical controls, which includes new controls that might be developed.
Note that the first four security controls are also part of the UK’s Cyber Essentials.
Moreover, for each of these security controls there could be a large number of potential
providers, each with their own specifications.
Clearly, the many CSRM factors discussed above—the diversity of threats, the range of
potential impacts, and the large number of products to choose from for the protection of
cyber assets, from a plethora of security controls to relatively new products such as cyber
insurance—illustrate the complexity of the CSRM challenges that must be overcome.
and made companies operating in Europe take notice. While demand for cyber insurance
in recent years has been led by large corporations from a wide variety of sectors that store
PII, this seems to be changing as smaller companies become more aware of cyber threats
and the costs associated with them (Inpoint, 2017; Aon Inpoint, 2018).
The supply side of the market is dominated by a few big players, although here too
smaller insurers are increasingly offering cyber insurance products. In the US more than
60% of standalone premiums were written by the five largest insurance companies and in
Europe the top three companies wrote over 70% of premiums (Inpoint, 2017). However, the
number of insurers underwriting cyber insurance products is steadily rising. There has been
a significant increase in insurers’ appetite for cyber risk over the past decade, leading to an
upturn in the number and variety of policies issued.
one incident could cause a cascading failure that triggers a collapse of the entire system2
(Ducos and de Ligniéres, 2019). For example, a cyber attack that takes down the power
grid could seriously threaten the viability of an insurance company or even of the insurance
industry as a whole if its impacts are consequential enough.
Another challenge is information asymmetry, given that organisations seeking to pur-
chase cyber insurance typically have more information about their risk posture than insurers.
This relates to moral hazard, or the risk that an organisation engages in riskier behaviour
because it has been insured. It can also lead to adverse selection, where an insurer provides
insurance coverage to an organisation whose risk is much higher than the insurer is aware of.
This results in an adverse effect for the insurer because it has issued an insurance policy at
a cost lower than it would charge if it were aware of the actual risk, exposing the insurer to
potential loses. Adverse selection is often due to an organisation seeking insurance coverage
providing false information or withholding pertinent information from the insurer.
Insurers are also confronted with the lack of data (Anderson and Fuloria, 2010) when
it comes to cyber incidents. Unlike in other domains that have similarly elevated levels of
risk—such as pandemics—there is an absence of historical data to draw on when setting
premiums. Organisations are also reluctant to disclose intrusion attempts or consequences
of attacks due to reputational concerns, as this could negatively affect their relations with
stakeholders or cause them to lose customers (Couce-Vieira et al., 2020a; Balchanos, 2012).
This challenge is exacerbated by an acute shortage of experienced cybersecurity under-
writers. Many underwriters have little knowledge of or experience with cybersecurity.
It can also be difficult to assess the financial impact of an attack that has occurred. For
example, for insurance products covering reputational loss from data breaches, it can be
particularly difficult to quantify the financial losses and implications for future revenues,
i.e. whether the loss is permanent or temporary.
If insurers can overcome these challenges, however, this represents an opportunity for
them to innovate in their offerings to help companies manage various degrees of risk.
developing new models that consider the behavioural aspects of attackers, overcoming a
key issue with current CSRM frameworks that do not take the intentionality of threats
into account;
examining other behavioural aspects by factoring in the decisions of companies and in-
surers;
developing a method of dynamically pricing cyber insurance products in response to
changes in a company’s cybersecurity risk profile, helping insurers deal with the rapidly
evolving nature of cybersecurity risk;
2 as opposed to the damage being contained to harming just one component of that system
10 Introduction
These topics are further developed and expanded upon in subsequent chapters. Chapter
2 provides an overview of the cyber insurance ecosystem and examines the decision-making
problems that organisations and insurers must contend with regarding risk management
for cybersecurity and cyber insurance, drawing on psychological perspectives. It also makes
use of an Agent-Based Model to assess the effects of various policy interventions on the
ecosystem. Chapter 3 discusses the cybersecurity challenges that organisations face, and
applies psychological and behavioural economics insights involving human behaviour and
decision-making to cybersecurity and cyber insurance. It also uses Behavioural Economics
Experiments to investigate the effects of behavioural interventions on cyber insurance up-
take. Building on this, Chapter 4 presents a series of models to assist organisations and
insurers with their decisions involving risk management in cybersecurity, including a key
model to help organisations determine their optimal allocation of cybersecurity resources
and select a cyber insurance product. It also provides auxiliary models to aid insurance com-
panies with their risk management issues, enabling better quantification of accumulation
risk and improved methods of designing and issuing cyber insurance products, including
ways to dynamically price these products. Chapter 5 presents a case study to illustrate
how to implement the key model developed in Chapter 4, providing detailed numerical ex-
amples. We conclude with a final discussion regarding the main points of this book and
their implications for policy.
2
The Cyber Insurance Landscape
CONTENTS
2.1 The cyber insurance ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2 The cyber insurance adoption process and its challenges . . . . . . . . . . . . . . . . . . . . . 14
2.3 Effects of policy interventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
This chapter provides an analysis of the cyber insurance landscape. We start with an over-
view of the cyber insurance ecosystem, presenting the cyber insurance life cycle and the
main and secondary actors. We then examine organisational decision-making involving cy-
bersecurity and cyber insurance, both for companies as a whole and for Small and Medium
Enterprises in particular. We present the findings of studies we have conducted on these
topics, which draw on the Burke and Litwin Performance and Change Model and on Pro-
tection Motivation Theory, and consider the policy implications. Finally, we simulate the
effects of different policy interventions on the ecosystem, making use of an Agent-Based
Model to do so.
11
12 The Cyber Insurance Landscape
1. Small and Medium Enterprises (SMEs) have a staff headcount below 250 per-
sons and a turnover below e50 million (European Commission, 2020).
2. Medium-sized companies have a staff headcount below 2,000 persons and a
turnover ≤ e500 million (Hargrave, 2019).
3. Large companies have a staff headcount of more than 2,000 persons or a turnover
above e500 million.
A company that purchases cyber insurance becomes an insured company. Insured com-
panies’ aims are to acquire a better picture of the cyber threats impacting them, transfer
cyber risk-related losses in exchange for reasonable premiums, get advice on cybersecurity
protective measures,2 and receive assistance in the cyber incident response process.
An insurance broker or other intermediary aims to provide advice to assist the company
in the selection of an appropriate cyber insurance product. Brokers aim to run a profitable
business and improve their market penetration. There are two types of brokers: retail and
wholesale. Since for the purposes of this model we are primarily interested in brokers
that sell cyber insurance products to companies, we only consider retail ones, who buy
insurance products from either insurers or wholesale brokers and sell them to businesses
1 Note that these categories will vary according to the insurer. Some insurers also have a Jumbo category.
2 Not every insurer offers these services.
The cyber insurance ecosystem 13
A threat actor (threat) is often a malicious actor that aims to launch an attack against the
company (Kissel, 2013). There are also non-malicious threat actors that unintentionally
cause harm, e.g. due to committing an error. In the cyber insurance context, the motiva-
tions and aims of threat actors could be essential factors for understanding the behavioural
elements of an attack. It is also important to distinguish between insider threats and ex-
ternal ones. Insiders already have access to the company’s information systems, while
external threat actors need to obtain access in order to perpetrate an attack.
A vendor provides companies with a product or service. This would typically be an equip-
ment vendor supporting the company’s businesses processes, such as a software provider
or network provider (Mentzer et al., 2001). Companies may require their vendors to have
cyber insurance and/or prove that they are compliant with cybersecurity regulations. [NB:
Although technically speaking a security provider (listed above) is a type of vendor, we
have separated these into two categories to emphasise an important distinction: a vendor
covers all vendors providing the company with products or services, while a security com-
pany only provides the company with security products and services.]
Study design
We drew on the Burke and Litwin (1992) Performance and Change Model, shown in Figure
2.2, in order to examine the drivers of IT-related decision-making, including the role of
the contextual factors mentioned above. The Burke and Litwin Model is a general model
describing the many factors that drive change within an organisation and serves as a useful
starting point. The model illustrates how behaviour within companies can be influenced by a
complex system of twelve factors. All the pathways between the factors are bidirectional, and
therefore all factors, from company structure to motivation in the workplace, can feed into
The cyber insurance adoption process and its challenges
Reinsurance
Research results provider
Threat
15
16 The Cyber Insurance Landscape
External
Environment
Leadership
Management
Practices
Systems
Structure (Policies and
Procedures)
Work Unit
Climate
Motivation
Task Requirements
Individual
and Individual
Needs and Values
Skills/Abilities
Individual and
Organisational
Performance
Figure 2.2: Burke and Litwin Performance and Change Model (adapted from Burke and
Litwin, 1992)
organisational change in many different ways. The model ranks them in order of influence,
with the most important factors at the top. The external environment is therefore the
dominant factor in the model, having a significant impact on a company’s mission and
strategy, organisational culture, and leadership, and through them, on the other factors as
well.
We can apply this model in a cybersecurity context. In order to identify the key roles
and influential drivers of cybersecurity and cyber insurance specifically, we conducted 11
in-depth interviews with practitioners inside companies. This included individuals respons-
ible for making cybersecurity decisions within a company as well as those involved in the
sale/marketing of cybersecurity-related products and services (including cyber insurance).
Those interviewed were from companies of different sizes, a mix of larger companies and
The cyber insurance adoption process and its challenges 17
SMEs. We then carried out a qualitative analysis to identify and understand the influen-
tial drivers of cybersecurity-related decision-making within companies at board and senior
management level.
Findings
We found that the decision-making process at company level involves a complex ecosystem in
its own right. These systems can vary dramatically between companies, depending upon size,
maturity, and sector. There is no universal ‘one size fits all’ structure for cybersecurity and
cyber insurance decision-making within companies. There are also many different factors,
both internal and external, that can influence companies’ cybersecurity decision-making
and cyber insurance adoption. Any cybersecurity services, products, and interventions need
to account for this variation between companies in the decision-making process.
Internal drivers
There are many different processes influencing cybersecurity-related decisions inside a com-
pany. For example, cyber insurance adoption often seems to be driven outside of the tech-
nical teams (for example, from finance). Companies often have complex (and non-universal)
structures involving numerous boards, committees, teams, and departments, each reflecting
their own motivations, priorities, and ways of doing things.
In keeping with Weishäupl et al. (2018), we found evidence that companies can perceive
cybersecurity-related decision-making (and related processes) to be time-consuming and
tedious. For example, even the process of acquiring an insurance quote (and gathering the
associated company information needed to obtain it) and the renewal process are seen as
effortful. This can have a detrimental impact upon cyber insurance adoption, and is further
compounded by a lack of awareness around cyber risk and cyber insurance coverage. Com-
panies also expressed a mistrust of insurers, with concerns in regards to lack of transparency
surrounding coverage. Resource and financial constraints also play a role.
External drivers
Cyber insurance adoption appears to be largely influenced by legislation and other policy
aspects. In keeping with Weishäupl et al. (2018), our findings suggest that there may be a
disconnect between the existing academic literature that sometimes regards cybersecurity
decision-making as intrinsically motivated, and the emerging literature (such as this current
study) that shows that companies may be more motivated to invest in cybersecurity because
they need to do so to comply with legislation.
Legislation as a driver for cyber insurance also fits within the Burke and Litwin Model.
As previously mentioned, this model suggests that the most dominant influence on organisa-
tional performance and change is the external environment. This could include factors such
as legislation (e.g. the introduction of the GDPR) and media coverage of cyber risk—both of
which were mentioned by those we interviewed as drivers of cyber insurance uptake. There-
fore, in much the same way as Burke and Litwin, we found that external factors appear to
have a strong influence on cybersecurity decision-making within companies.
Many approaches to cybersecurity assume a rational decision-making process. However,
human decision-making and perception of risk does not always follow rational processes
(Evans, 2003). This will be discussed further in Chapter 3. Many approaches also assume
accurate calculations of benefit and risk—but this is unlikely at best, due to the current
lack of data on cyber risk and how to measure it (Eling and Schnell, 2016).
Our findings suggest that companies may be responsive to more detailed cyber insur-
ance policy wording regarding the specific terms and conditions of coverage (e.g. inclusions
18 The Cyber Insurance Landscape
and exclusions). However, greater precision can make it difficult for policies to take into ac-
count the changing nature of the cybersecurity environment. Therefore a balance is needed
between providing enough detail to reassure and/or guide companies, whilst maintaining
enough room for policies to take into account new developments in cybersecurity risk and
protection. Further research is required to investigate the most appropriate level of spe-
cificity. Legislation surrounding the standardisation of cyber insurance policy wording could
help to reassure companies, and also address confusion over what policies cover (and clarify
the perceived ‘grey area’ between traditional insurance policies and cyber policies).
Given companies’ lack of confidence in insurers, policymakers should foster practices that
could help build trust between insurers and insured companies. To achieve greater awareness
around cyber risk and improve cybersecurity practices, policymakers can help partially
overcome the issues involving the absence of good cyber incident data by promoting greater
information sharing. There is a need for further investigation into the most appropriate
ways to implement this.
Study design
To investigate what mechanisms and factors influence how SMEs decide on cyber insurance
adoption, we drew on the Protection Motivation Theory (PMT) Model. We use Rogers’
1983 revision of the model, which is the most commonly used version, shown in Figure
2.3 (Rogers, 1983; Floyd et al., 2000). PMT is a behavioural theory that identifies the
elements that a decision-maker relies on to determine whether or not to protect against a
threat. According to PMT, the protection motivation of an SME is based on three main
components: sources of information, threat appraisal, and coping appraisal. There are two
types of sources of information: environmental and intrapersonal. Environmental sources of
information (rewards, severity, and vulnerability) are used to create the threat appraisal,
and intrapersonal sources of information (response efficacy, self-efficacy, and response costs)
are used to create the coping appraisal.
We conducted semi-structured interviews with representatives of ten SMEs. The in-
terviews used semi-structured interview questions based on PMT. (The semi-structured
interview guide is available in Labunets et al. (2019).)
Findings
We developed a Cyber Insurance Adoption Model for SMEs, shown in Figure 2.4, to illus-
trate an SME’s decision-making process regarding cyber insurance (Martinez Bustamante,
2018). In the centre of the model is cyber insurance adoption. The other components show
the cognitive process that a decision-maker uses to decide whether or not to purchase cy-
ber insurance. It is based on the three central components of the PMT model—sources
of information, threat appraisal, and coping appraisal —but extends it with two additional
components: potential impediments and drivers of cyber insurance adoption. These two
The cyber insurance adoption process and its challenges 19
Sources of
Cognitive Mediating Processes
information
Severity
Threat
Rewards
appraisal
Environmental Vulnerability
Fear Protection
motivation
Response
Interpersonal efficacy
Response Coping
costs appraisal
Self-efficacy
Figure 2.3: Protection Motivation Theory (PMT) Model (Rogers, 1983 revision)
additional components arose out of the interview process as important elements to consider
as well.
Overall, the interview findings revealed that the cyber insurance decision-making process
is problematic for SMEs due to poor understanding of cybersecurity risks and the dynamic
nature of those risks. We provide more specifics about each model component.
Sources of information
We identified the following needs surrounding a company’s sources of information: Cyber
insurance is a relatively new concept for SMEs, so insurers and brokers have to be proactive
in raising SMEs’ awareness of cyber risks and available cyber insurance products. A policy
measure regulating the role and liability of insurers and brokers in advising their clients on
cybersecurity could benefit SMEs, as it is key for them to receive high-quality advice and
trust their advisors. Insurers and brokers also need to be fully cognizant of the responsibility
that they bear as advisors.
Another factor is that SMEs view the cyber threats they face and mitigation tactics they
use as sensitive topics. This could explain why SMEs are often not willing to share their
cybersecurity methods, which likely slows down the diffusion of cybersecurity best practices
among SMEs. Further policy measures establishing and/or promoting cybersecurity certi-
fication schemes for companies and raising cybersecurity awareness could help SMEs obtain
a clearer picture of their cybersecurity readiness. Cihon et al. (2018) agree: “Regulation
should clearly signal to firms that certification helps meet their cybersecurity ‘duty of care’,
which, if a breach were to occur, would see firms enjoy better defence against tort liability
and fines.” (NB: A cybersecurity certification framework is underway in the EU.)
Threat appraisal
Digitalisation is important for a company’s growth, but it also creates new threat vectors
through which a company can be attacked. While embracing digitalisation (e.g. cloud tech-
nology), SMEs are simultaneously concerned as part of their threat appraisal that this makes
them more vulnerable to experiencing a data leak—which could affect the company’s repu-
20 The Cyber Insurance Landscape
tation and cause clients to lose trust in them. This drives them to increase their security
measures in order to protect their data. It also pushes them to consider cyber insurance as
a practical risk transfer strategy. As mentioned previously, a policy measure encouraging
the development of standard language for cyber insurance policies could help SMEs better
understand what residual risks they can transfer with cyber insurance.
Coping appraisal
When it comes to a company’s coping appraisal, our findings indicate that cyber insurance
is an attractive option for SMEs to transfer the risk of potential losses from a cyber attack
if the insurance policy is clear and the premium price is fair. Since cyber insurance also
provides policy holders with complementary information regarding cyber threats and help
with cyber incident management, this creates added value for SMEs because they tend to
lack knowledgeable personnel to deal with incidents. (However, if a company has inves-
ted sufficiently in cybersecurity protection measures and has skilled staff, then it has less
motivation to buy cyber insurance.)
Further policy measures/regulations that impose financial costs on companies that ex-
perience cyber incidents (e.g. cost of notifying affected organisations or individuals following
a breach, or fines in the event of a breach attributable to non-compliance with regulations)
will likely motivate them to consider cyber insurance options. Various insurers already offer
services helping companies ensure that they are compliant with existing regulations. Again,
standardising cyber insurance policy language will help.
Impediments
Many of the impediments to cyber insurance adoption are problems that arise when com-
panies try to buy cyber insurance. The process can be seen as complicated and there is
often confusion about what a policy’s coverage entails—as well as doubts about whether
it will actually pay out in the event of an incident. High premiums also have a dissuasive
effect.
Another reason for SMEs not purchasing cyber insurance is that a number of them be-
lieve they have a low probability of being attacked. Some companies, notably IT companies,
think that they already have sufficient cybersecurity measures in place, so purchasing cyber
insurance does not provide them with any added value. Finally, some erroneously believe
that they have transferred the risk to the security provider; one of the interviewees com-
mented that “it’s not necessary for us to have insurance because [the security provider] has
taken care of the [risk]”.
Drivers
The main drivers of purchasing cyber insurance for companies include wanting to protect
their reputation, which they do through various risk mitigation strategies, cyber insurance
being one of them. Sectorial regulators make some recommendations in this respect.
Increasing awareness and experience of cybersecurity incidents also drives decision
makers towards cyber insurance adoption. As mentioned previously, the additional services
provided by cyber insurance (e.g. cyber threat information or incident assistance) motivates
companies to purchase policies as well. Finally, small company status is a driver of cyber
insurance adoption, with small companies increasingly realising that cyber insurance can
help them.
The cyber insurance adoption process and its challenges
Figure 2.4: Cyber Insurance Adoption Model (Martinez Bustamante, 2018)
21
22 The Cyber Insurance Landscape
Figure 2.5: Simplified ecosystem for the Agent-Based Model (Sewnandan, 2018)
Using the model above, we investigated the effects of the following cyber insurance policy
options on the ecosystem as a whole:
Package options: the combination of the maximum amount in damages covered by the
insurance and the insurance premium;
Contract length: the duration of the insurance contract (6, 12, or 24 months);
Risk selection: demanding improved cybersecurity levels,5 or increasing the premium for
clients when an insurer believes their cybersecurity levels need improvement;
Incentivisation: lowering the premium for clients with high cybersecurity levels;
Upfront risk assessment: requiring a potential client to perform a certain type of risk
assessment first6 ;
Sharing cybersecurity information: providing clients with information on security controls,
threats, etc. to help enhance their cybersecurity;
Requiring organisations to maintain their cybersecurity levels: demanding that their initial
cybersecurity levels are maintained to retain coverage.
We ran simulations for an ecosystem consisting of 125 organisations.
We also conducted a synergy experiment, which involves determining whether two or
more discrete policy options can have a combined effect that is greater than the sum of the
effects of each on their own. In essence, whether the whole is greater than the sum of its
parts. In the experiment, we investigated the effects of combining the options risk selection,
incentivisation, and sharing cybersecurity control information.
2.3.2 Findings
We measured the effect of the different policy options on (a) the average security level in
the ecosystem, (b) the global value loss in the ecosystem (i.e. the total asset value lost, or
the inverse of resilience), and (c) the percentage of insured organisations, under the model
assumptions and parameter settings.
We observed that the effects of the different policy options on the average security level
in the ecosystem are relatively small, with the synergy experiment providing the best results.
For all policy options, the average security level was in the range of 0.54 to 0.58.
In terms of the impact on global value loss, the effects are small as well. In this case, the
effect of the synergy experiment is somewhere in the middle compared to individual policy
options. This suggests that although the combination of policy options improves overall
security, it does not necessarily improve resilience, in the sense of reducing the global value
loss. This could be because high-risk organisations might not purchase cyber insurance when
the risk selection and incentivisation policy options are implemented, due to not being able
to purchase it at an acceptable price.
Also, the synergy experiment results in a relatively low percentage of insured organisa-
tions (less than 40 out of 125 organisations, or 32%). This is because the combined policy
options make cyber insurance less attractive for some (high risk) organisations, thereby re-
ducing adoption but improving ecosystem-level security. The detailed overview of the results
is available in Sewnandan (2018).
5 In practice this would be among companies that already have reasonable cybersecurity levels, as insurers
will not insure companies that have poor or low security levels. Insurers decline many risks based on a
company having poor or low cybersecurity levels. The threshold will depend on each insurer’s individual
risk tolerance.
6 At present, many insurers only assess a potential client’s risk based on the client’s application form.
24
The Cyber Insurance Landscape
Figure 2.6: Flow diagram of the Agent-Based Model (Sewnandan, 2018)
Effects of policy interventions
Figure 2.7: Interface of the Agent-Based Model in NetLogo (Sewnandan, 2018)
25
Other documents randomly have
different content
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookball.com