29.11.2015 Views

CYBER SECURITY INCIDENT MANAGEMENT GUIDE

Cyber-Security-Incident-Management-Guide-2015

Cyber-Security-Incident-Management-Guide-2015

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

01 PREPARING FOR A <strong>CYBER</strong> <strong>SECURITY</strong> <strong>INCIDENT</strong> 18<br />

VII.<br />

<strong>CYBER</strong> INSURANCE<br />

Certain insurers offer customised insurance policies that are always preceded<br />

by an analysis of the risks specific to the organisation in question. This analysis<br />

allows the organisation to determine if and to which extent it needs cyber<br />

security insurance. The risk analysis will also be used by the insurer to determine<br />

the cover required. Factors that are taken into account are:<br />

• business exposure: high technology with exclusive production process<br />

and heavy Research & Development<br />

• type of distribution network: e-commerce<br />

• amount and type of data (critical or not), the existence of a legal<br />

framework.<br />

ITEMS POTENTIALLY COVERED BY A <strong>CYBER</strong> INSURANCE<br />

RECOVERY COSTS IN CASE<br />

OF LOSS OF DATA<br />

POTENTIAL LOSS OF<br />

TURNOVER<br />

€ + +<br />

+<br />

ADDITIONAL COSTS ASSOCIATED<br />

WITH THE DETECTION AND<br />

RESOLUTION OF <strong>INCIDENT</strong>S<br />

COST OF COMMUNICATION IN<br />

THE EVENT OF AN <strong>INCIDENT</strong><br />

Compensation is paid out above an excess negotiated with the policyholder.<br />

The amounts insured per claim and/or per insurance year are always<br />

determined according to the needs of the company and the capabilities of<br />

the insurance company.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!