CYBER SECURITY INCIDENT MANAGEMENT GUIDE
Cyber-Security-Incident-Management-Guide-2015
Cyber-Security-Incident-Management-Guide-2015
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
01 PREPARING FOR A <strong>CYBER</strong> <strong>SECURITY</strong> <strong>INCIDENT</strong> 18<br />
VII.<br />
<strong>CYBER</strong> INSURANCE<br />
Certain insurers offer customised insurance policies that are always preceded<br />
by an analysis of the risks specific to the organisation in question. This analysis<br />
allows the organisation to determine if and to which extent it needs cyber<br />
security insurance. The risk analysis will also be used by the insurer to determine<br />
the cover required. Factors that are taken into account are:<br />
• business exposure: high technology with exclusive production process<br />
and heavy Research & Development<br />
• type of distribution network: e-commerce<br />
• amount and type of data (critical or not), the existence of a legal<br />
framework.<br />
ITEMS POTENTIALLY COVERED BY A <strong>CYBER</strong> INSURANCE<br />
RECOVERY COSTS IN CASE<br />
OF LOSS OF DATA<br />
POTENTIAL LOSS OF<br />
TURNOVER<br />
€ + +<br />
+<br />
ADDITIONAL COSTS ASSOCIATED<br />
WITH THE DETECTION AND<br />
RESOLUTION OF <strong>INCIDENT</strong>S<br />
COST OF COMMUNICATION IN<br />
THE EVENT OF AN <strong>INCIDENT</strong><br />
Compensation is paid out above an excess negotiated with the policyholder.<br />
The amounts insured per claim and/or per insurance year are always<br />
determined according to the needs of the company and the capabilities of<br />
the insurance company.