Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process that applicants need to go through to apply for cyber insurance. A typical process would require an applicant to fill out a proposal form, which is a self-assessed questionnaire. In this paper, we examine 24 proposal forms, offered by insurers based in the UK and the US, to determine which security controls are present in the forms. Our aim is to establish whether the collection of security controls mentioned in the analysed forms corresponds to the controls defined in ISO/IEC 27002 and the CIS Critical Security Controls; these two control sets are generally held to be best practice. Th...
Cybersecurity is a set of technologies, processes, practices, and response and mitigation measures a...
Purpose – to clarify the characteristics of cyber risk and cyber insurance. More specifically to id...
In today‟s marketplace where businesses are constantly being threatened by data breaches and cyber-a...
Policy discussions often assume that wider adoption of cyber insurance will promote information secu...
This paper outlines the opportunities of and challenges in using cyber insurance to incentivise cybe...
Governments and businesses are struggling to cope with the scale and complexity of managing cyber ri...
Cyber insurance is a key component in risk management, intended to transfer risks and support busine...
Risk transfer plays an increasing role in information security risk management as organisations purc...
Risk transfer can be an economically favorable way of handling security and privacy issues, but choo...
Cyber insurance is a key component in risk management, intended to transfer risks and support busine...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
Cyber-insurance can fulfil a key role in improving cybersecurity within companies by providing incen...
This volume covers a wide spectrum of issues relating to economic and political development enabled ...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Cyber insurance is gaining importance in our society. There is a clear distinction between policies ...
Cybersecurity is a set of technologies, processes, practices, and response and mitigation measures a...
Purpose – to clarify the characteristics of cyber risk and cyber insurance. More specifically to id...
In today‟s marketplace where businesses are constantly being threatened by data breaches and cyber-a...
Policy discussions often assume that wider adoption of cyber insurance will promote information secu...
This paper outlines the opportunities of and challenges in using cyber insurance to incentivise cybe...
Governments and businesses are struggling to cope with the scale and complexity of managing cyber ri...
Cyber insurance is a key component in risk management, intended to transfer risks and support busine...
Risk transfer plays an increasing role in information security risk management as organisations purc...
Risk transfer can be an economically favorable way of handling security and privacy issues, but choo...
Cyber insurance is a key component in risk management, intended to transfer risks and support busine...
This research, conducted under the EIC Program at IRT-SystemX1, concerns the conditions needed for k...
Cyber-insurance can fulfil a key role in improving cybersecurity within companies by providing incen...
This volume covers a wide spectrum of issues relating to economic and political development enabled ...
Cybersecurity practitioners working in organisations implement risk controls aiming to improve the s...
Cyber insurance is gaining importance in our society. There is a clear distinction between policies ...
Cybersecurity is a set of technologies, processes, practices, and response and mitigation measures a...
Purpose – to clarify the characteristics of cyber risk and cyber insurance. More specifically to id...
In today‟s marketplace where businesses are constantly being threatened by data breaches and cyber-a...