What Is Cyber Insurance?
Cyber insurance is a specialised risk transfer product that provides financial protection against losses resulting from cybersecurity incidents. It covers costs that organisations cannot prevent through security controls alone — incident response, business interruption, regulatory penalties, and liability claims.
For compliance-driven organisations, cyber insurance complements the controls required by ISO 27001, SOC 2, NIS2, and DORA by addressing residual risk that cannot be fully mitigated through technical and organisational measures.
Coverage Types
| Coverage | Type | What It Covers |
|---|
| Incident response | First-party | Forensic investigation, legal counsel, breach notification |
| Business interruption | First-party | Lost revenue and extra expenses during downtime |
| Data recovery | First-party | Costs to restore or recreate lost or corrupted data |
| Ransomware | First-party | Ransom payment, negotiation services, recovery costs |
| Regulatory | First-party | Fines, penalties, and regulatory defence costs |
| Data breach liability | Third-party | Claims from affected individuals or businesses |
| Network security liability | Third-party | Claims from network failures affecting others |
| Media liability | Third-party | Claims from online content or advertising |
Insurer Security Requirements
| Control | Insurer Priority | Impact on Coverage |
|---|
| MFA for remote access | Critical | Application denied without it |
| EDR on all endpoints | Critical | May void coverage if absent during claim |
| Offline/immutable backups | Critical | Ransomware claims require proven backup |
| Patch management | High | Unpatched known vulnerabilities excluded |
| Email security | High | Business email compromise claims scrutinised |
| PAM | High | Privilege escalation claims examined |
| Security awareness training | Medium | Phishing-related claims reviewed |
| Incident response plan | Medium | Faster response reduces claim size |
| Network segmentation | Medium | Reduces blast radius of incidents |
| Vulnerability scanning | Medium | Shows proactive risk identification |
Policy Selection Criteria
| Criterion | Consideration | Questions to Ask |
|---|
| Coverage limits | Match to realistic worst-case scenario | What is our maximum potential loss? |
| Deductible | Balance premium cost vs. self-insured retention | What can we absorb without insurance? |
| Retroactive date | Cover for incidents that occurred before policy inception | Are pre-existing undiscovered breaches covered? |
| Sublimits | Specific caps on certain coverage areas | Are ransomware payments capped separately? |
| Exclusions | What is specifically not covered | Is state-sponsored activity excluded? |
| Notification requirements | Timeframes for reporting incidents to insurer | How quickly must we notify the insurer? |
| Panel providers | Required use of insurer-approved vendors | Can we use our own incident response team? |
Premium Reduction Strategies
| Strategy | Expected Impact | Evidence Required |
|---|
| ISO 27001 certification | 10-20% reduction | Certificate and scope documentation |
| SOC 2 Type II report | 10-15% reduction | Current SOC 2 report |
| MFA deployment (100%) | 5-15% reduction | MFA coverage report |
| EDR coverage (100%) | 5-10% reduction | EDR deployment evidence |
| Tested incident response plan | 5-10% reduction | Tabletop exercise reports |
| Immutable backup strategy | 5-10% reduction | Backup architecture documentation |
| Security awareness programme | 3-5% reduction | Training completion records |
| No prior claims | Significant impact | Clean claims history |
Claims Process
| Phase | Actions | Timeline |
|---|
| Detection | Identify potential incident, assess severity | Immediate |
| Notification | Contact insurer's claims hotline within policy timeframe | Within 24-72 hours |
| Triage | Insurer assigns breach coach, forensics, and legal | 1-3 days |
| Investigation | Forensic investigation to determine scope and cause | 1-4 weeks |
| Response | Breach notification, credit monitoring, PR response | As required by law |
| Recovery | System restoration, remediation of vulnerabilities | 2-8 weeks |
| Claim settlement | Documentation of all costs, submission for reimbursement | 30-90 days |
Compliance Intersection
| Framework | Insurance Relevance | Control Overlap |
|---|
| ISO 27001 | Risk treatment option (A.5.6, risk transfer) | Security controls reduce premiums |
| SOC 2 | Demonstrates control environment maturity | SOC 2 report lowers premiums |
| NIS2 | Risk management measures (Art. 21) | Compliance posture supports applications |
| DORA | ICT risk management framework (Art. 6) | Operational resilience requirements align |
| GDPR | Financial protection for breach costs | Regulatory fine coverage (where insurable) |
Common Mistakes
| Mistake | Risk | Fix |
|---|
| Treating insurance as a security substitute | Claim denied due to inadequate controls | Insurance complements security, never replaces it |
| Not reading exclusions | Unexpected claim denial for excluded scenarios | Review all exclusions with broker, understand war clauses |
| Underinsuring | Costs exceed coverage limits during major incident | Model realistic worst-case scenarios for limit selection |
| Late insurer notification | Claim denied due to late reporting | Know notification deadlines, report early when in doubt |
| Not updating policy with business changes | Coverage gaps from acquisitions, new services, or cloud migration | Annual policy review aligned with business changes |
| Ignoring sub-limits | Key coverage areas capped below expected costs | Review and negotiate sub-limits for ransomware, business interruption |
How Orbiq Supports Cyber Insurance Readiness
Orbiq helps you demonstrate the security posture insurers require:
- Evidence collection — Centralise security policies, control evidence, and compliance reports
- Continuous monitoring — Track control coverage across insurer requirements
- Trust Center — Share your security posture via your Trust Center
- Compliance mapping — Map controls to insurer questionnaire requirements
- Audit readiness — Pre-built evidence packages for insurance applications and renewals
Further Reading