Mandatory breach reporting creates cyber-insurance imperative: Marsh

The looming introduction of mandatory data-breach laws will force many Australian companies to buy ‘cyber liability’ insurance policies to cover breach-related damage that’s not covered under existing business insurance policies, an insurance-industry specialist has warned.

Speaking to CSO Australia ahead of an industry forum to discuss the escalating cyber risk facing Australian companies, Craig Claughton, NSW manager for FINPRO with business-interruption firm Marsh Australia, said many companies remained unaware that their existing policies would not cover damage or loss arising from cyber-attacks.

“Traditional property and professional indemnity policies do certain things, and most of these will not relate to cyber-attacks principally because they’re used to damage being done by physical means. There’s a gaping hole around cyber exposure.”

That hole has been filled for several years by specialist cyber liability products, with UK and Australian underwriters already offering around $150m worth of UK and Australian-sourced funding for domestic cyber-security policies. That is expected to increase dramatically if mandatory breach-notification legislation is introduced, at which point Claughton anticipates a market rush as businesses race to catch up.

Exactly what comprises a cyber-security policy, however, is still being figured out. Insurers typically offer “quite reasonable” premiums and are vetting customers with “pretty limited questions” that reflect the nascent state of the market, said Claughton, adding that premiums may well increase as mandatory breach notification paints a better picture of the real (and often unstated) security risk facing Australian companies.

“It’s like any insurance policy,” he explains. “Insurers need to have data, then they can chart what they expect the premiums to be. Insurers are still learning about this risk as well, and at the moment I think they don’t know how to price it; they don’t yet know what they don’t know.”

Policies aren’t simple set-and-forget affairs, however: although customers need to demonstrate basic protection measures such as antivirus software, use of encryption and compliance with standards such as PCI DSS payment-card security.

The policies also cover a specific set of potential circumstances, including business interruption and cyber extortion, but will not typically cover reputational damage that occurs because of a breach.

Insuring against risk requires companies to appreciate the full extent of their vulnerability to security breaches – which in itself requires a level of planning and consideration that many companies still have yet to undergo. Mandatory breach legislation would, however, force their hand, says Claughton – pushing small businesses, in particular, to quickly catch up.

“Many of our largest clients have already self-identified cyber security and the risks related to that, both in terms of compliance with the law and the downside to having a breach,” he explained.

“They tell us it’s one of the highest levels of operational risk. But even a small business can have a lot of clients, and if this law changes and they do have a data breach, they will have this compulsory requirement.”

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

JP Morgan to invest £150 million on boosting cyber security

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

ZENworks® Endpoint Security Management

Get powerful mobile security capabilities, and protect the data the various mobile devices inside your organization.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.