Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
How Can I Ensure Cyber Insurers Will Pay My Claim?
Newest First  |  Oldest First  |  Threaded View
Richard F.
50%
50%
Richard F.,
User Rank: Apprentice
3/10/2020 | 1:31:40 PM
Cyber Insurance Uncertainties and Concealed Traps
Cyber insurance is fraught with serious problems.  There is no standard coverage language in the policies.  Buyers are required to understand arcane terms, sublimits and exclusions. Of course, you have actually read and fully understand every word and comma of your potential policy????? 

Worse, the policies have numerous concealed traps.  Many policies require expensive arbitration of coverage disputes.  Even if your states' law prohibits arbitration of insurance disputes, federal courts, law and treaties can override the McCarran-Furguson Act and force Buyers to have claims decided by foreign arbitrators in London, Geneva, Paris or Hamilton. If the Buyer is lucky, the surprise required arbitration may be in New York. All of those venues are at the expense of an already damaged company needing prompt payment.

Some insurers try to force insurance industry dominated arbitrators onto Insureds by policy provisions requiring specific arbitration administrators, of course to "ensure "quality" Neutrals." Those include by reference use of their associated over-restrictive, incestuous "repeat player" favoring arbitrator panels. 

Different federal circuits and state courts have interpreted the same language differently. Provisions that have been interpreted by courts as granting coverage in some circuits and states exclude coverage for the same risks in other circuits and states.   

It is critical that Buyers obtain expert advice from lawyers and brokers.  Or risk joining Mondelez and other companies fighting to obtain the coverage they thought they had purchased.

Richard Faulkner, J.D., LL.M., F.C.I.Arb.
mcavanaugh1
50%
50%
mcavanaugh1,
User Rank: Strategist
10/15/2019 | 7:57:37 AM
Re: Cyber Insurance claim
To confirm, most of the claims declined and firms that are suing their insurer attempted to file a claim under a non-cyber policy.  Mondelez is the case most reference however they tried to get coverage under their Property Insurance policy after refusing to purchase a Cyber policy for years.  Also, the declination was under the War Exclusion.

There is a lot of misconception as to what is covered, is not coverage, how it is covered, and what needs to be done to obtain coverage. This is partly the fault of the insurance industry as each Cyber policy is different with varying coverage, underwriting, and requirements. Most long-standing insurance companies writing Cyber Insurance do not require constant updating or any sort of updating outside of what an insured puts on an application.  The most important factor is to work with an agent/broker/carrier that is knowledgable in this space and up to date on the emerging risks to ensure that a policy is placed with the best carrier for the specific company.  There is no "best policy" or "best carrier" in the marketplace only the best carrier for the specific insured.
renglish98
50%
50%
renglish98,
User Rank: Apprentice
9/26/2019 | 9:21:25 AM
Cyber Insurance claim
The answer is not as striaghtforward as one would think. After notPetya, several firms had to sue their insurers who refused to pay the cyber claim as they argued that it was a state-sponsored attack and exempted via a force majeur clause.

Similarly, customers need to be constantly patching and remediating vulnerabiliies to demonstrate they are performing 'due care' and not unreasonably exposing their firm to cyber risk, which could be a claim denial justification.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.