{"id":4483,"date":"2019-01-18T02:48:00","date_gmt":"2019-01-18T02:48:00","guid":{"rendered":"https:\/\/securityexpress.au\/?p=4483"},"modified":"2022-07-24T06:34:30","modified_gmt":"2022-07-24T06:34:30","slug":"part-3-prioritise-the-isms-controls","status":"publish","type":"post","link":"https:\/\/securityexpress.com.au\/part-3-prioritise-the-isms-controls\/","title":{"rendered":"Debate on Managing Accumulation Risk in Cyber Insurance"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

Moderated by Petra Wildemann<\/a>, Guests are Denny Wan<\/a> and Steve Wilson<\/a><\/p>\n\n\n\n

Managing Accumulation Risk in Cyber Insurance<\/h2>\n\n\n\n

The debate extends the concepts of the discussions in the white Papers on \u201cPro-Active Insurance Pricing Model\u201d and \u201cCyber Incentive Model\u201d with the discussion of the paper \u201cAdvancing Accumulation Risk Management in Cyber Insurance – Prerequisites for the development of a sustainable cyber risk insurance market\u201d. The debate explores how important it is that the insurance markets manage the accumulation risk and learning to understand it better so the market can continue to expand. <\/p>\n\n\n\n

We discuss the role of cyber insurance in supply chain risk management and learn that the beneficiaries of the cyber insurance policy in a supply chain context are generally not the policyholders. And furthermore, it can be compared to other insurance lines such as automotive in particular when looking at \u201cUsage Based Insurance (UBI)\u201d, which is a rising parallel trend collecting data from installed black boxes in vehicles. Policyholders just expect \u201cgood drivers to be rewarded with lower premiums\u201d, which is also a topic for cyber risks and cyber security, both in technology and in cloud systems. <\/p>\n\n\n\n

There is a rapid increase in businesses and individuals, who outsource to the cloud with a potential for risk concentrating around Cloud Service Providers\u2019 operations. The usage of common software packages and some software runs across industries, so these create wide-spread exposure to malware attacks. The insurance industry can provide its experience with other risks in a variety of business lines. In the debate, we discuss several factors regulations, risk mitigation along the risk value chan.<\/p>\n\n\n\n

Insurance is fundamentally a risk transfer process rather a technology challenge. It is largely based on people\u2019s perception of risk and their risk appetite. Self-insurance is an easy way out when the perception of risk is hard to define. As Steve explained, maintaining strong underwriting discipline is a foundation to limiting accumulation risk. <\/p>\n\n\n\n

Transcript on “Managing Accumulation Risk in Cyber Insurance”<\/a><\/p>\n\n\n\n

Podcast: https:\/\/www.securityexpress.com.au\/wp-content\/uploads\/2019\/01\/Debate_on_managing_risk_in_cyber_insurance.mp3<\/a><\/p>\n\n\n\n

<\/p>\n\n\n\n

<\/p>\n\n\n\n

Find the original article here: https:\/\/www.linkedin.com\/pulse\/debate-managing-accumulation-risk-cyber-insurance-denny-wan\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Moderated by Petra Wildemann, Guests are Denny Wan and Steve Wilson Managing Accumulation Risk in Cyber Insurance The debate extends the concepts of the discussions in the white Papers on \u201cPro-Active Insurance Pricing Model\u201d and \u201cCyber Incentive Model\u201d with the discussion of the paper \u201cAdvancing Accumulation Risk Management in Cyber Insurance – Prerequisites for the development of a sustainable […]<\/p>\n","protected":false},"author":1,"featured_media":4486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"_links":{"self":[{"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/posts\/4483"}],"collection":[{"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/comments?post=4483"}],"version-history":[{"count":2,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/posts\/4483\/revisions"}],"predecessor-version":[{"id":4488,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/posts\/4483\/revisions\/4488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/media\/4486"}],"wp:attachment":[{"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/media?parent=4483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/categories?post=4483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityexpress.com.au\/wp-json\/wp\/v2\/tags?post=4483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}