Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/3/2016
10:35 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Do Security Companies Need to Issue Warranties?

Jeremiah Grossman outlines how IT security firms are starting to offer guarantees with the backing of insurance companies.

BLACK HAT USA – Las Vegas – On a day when keynote speaker Dan Kaminsky told the security industry that it must do better, industry veteran Jeremiah Grossman offered a path to some meaningful change.

In a one-hour session on cyber  insurance, Grossman underscored why with all the high-profile hacks there’s good reason for companies to feel vulnerable today and that security companies need to start thinking about offering guarantees.

Citing a Dark Reading survey, Grossman said that 15 percent of security managers have no doubt that their company will have to respond to a major security incident in the next 12 months.

“Our industry must change,” said Grossman, who now works as chief of security strategy at SentinalOne. “Not many people believe us anymore, so the best way for us to move forward is to share our knowledge. Think about it, the security industry is one of the only businesses that doesn’t offer any guarantees or returns policies.” 

Grossman talked about recently-introduced guarantees at SentinalOne, WhiteHat Security and Trusona. At SentinalOne, for example, the company now insures up to $1,000 per endpoint with a maximum cap of $1 million if a customer experiences a ransomware attack. The insurance costs about $15,000 to $30,000 a year and is tied into a company’s general liability insurance.

Parallax reported that one-third of U.S. companies buy cyber insurance, a market that PwC estimated will grow to $7.5 billion by 2020. 

Grossman crunched some numbers and found that companies spend $3.8 billion annually on traditional security equipment like AV, firewalls and intrusion detection, but they also spend $3.2 billion on cyber insurance. 

“So a lot of the companies out there just opt to spend money on insurance when they get hit with an incident,” he said. But the numbers from some of the leading incidents also show that companies are not buying enough cyber insuranace.  The Target breach cost the retailer $248 million, but the insurance company only paid out $90 million. And Home Depot lost $43 million on its breach, with a payout of about $15 million.

“So what this tells us is that big companies are buying insurance, breaches happen and the insurance companies pay,” he added. 

And companies finally understand that they need more insurance.

Anthem, which experienced a major breach in February 2015, now has a policy in excess of $150 million, Grossman said. And companies are now stacking insurance policies. For example, one carrier may cover up to the first $50 million, while another company may cover the next $100 million. 

Grossman predicted that the cyber insurance market will explode in the next few years. Companies will need to work with brokers who can piece together coverage from different sources. He also said there’s a market forming for security ratings services that use analytics to issue a rating similar to a FICO score for home buyers. 

Related Content:

 

 

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JulietteRizkallah
100%
0%
JulietteRizkallah,
User Rank: Ninja
8/5/2016 | 10:07:59 AM
Be Secured but be insured
The cyber security insurance industry is now well established and growing fast due to the ever increasing breaches.  Now SentinelOne makes a first mover bet by being the first security company to guarantee its cybersecuriy solution with a warranty.  Bold and smart.  Competitors will watch before they decide to follow as this can become a lucrative revenue stream for the company - reselling cybersecurity insurance as warranty - or a demonstration that their solutions are less than bullet proof if a large number of customers activate that warranty.  In any case it is a clear claim from security companies that security, not matter which one you chose, is not bullet proof and breaches will happen.  It is not a matter of if but when.
Whoopty
50%
50%
Whoopty,
User Rank: Ninja
8/4/2016 | 7:54:33 AM
Protection
This is a great idea, as it means there are safeguards in place for companies that hire on dodgy security companies. It should make weeding out the poor security companies from the strong ones too and will mean it's more lucrative to be effective at your job, which is a great way to encourage people to work harder. 
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24376
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory w...
CVE-2021-24377
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on t...
CVE-2021-24378
PUBLISHED: 2021-06-21
The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute w...
CVE-2021-24379
PUBLISHED: 2021-06-21
The Comments Like Dislike WordPress plugin before 1.1.4 allows users to like/dislike posted comments, however does not prevent them from replaying the AJAX request to add a like. This allows any user (even unauthenticated) to add unlimited like/dislike to any comment. The plugin appears to have some...
CVE-2021-24383
PUBLISHED: 2021-06-21
The WP Google Maps WordPress plugin before 8.1.12 did not sanitise, validate of escape the Map Name when output in the Map List of the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue