Risk Transfer Without Understanding: The Insurance Problem in Cyber
The organizations having the most difficulty with cyber insurance are not the ones with the worst security programs. They are the ones with the largest gap between what their policy says they have implemented and what they have actually implemented.
Part of the Phase II — Understanding series
By Michael E. Ruiz
Cyber insurance has matured considerably in the past five years, driven by a claims experience that forced the industry to actually understand what it was insuring. Underwriters who once relied on questionnaires and attestations now conduct technical assessments. Policy terms have become more specific, exclusions have multiplied, and premiums have risen in ways that reflect the actual loss experience rather than assumptions borrowed from other insurance lines. This maturation is good for the market. It is also revealing something about the organizations purchasing coverage that the security industry should pay attention to.
The organizations that are having the most difficulty with cyber insurance are not the ones with the worst security programs. They are the ones with the largest gap between what their policy says they have implemented and what they have actually implemented. Attestation-based underwriting invited this gap: when coverage depended on checking boxes rather than demonstrating controls, organizations learned to check boxes. The market correction toward technical verification is exposing the inventory of controls that exist on paper and not in practice.
This matters beyond the insurance transaction. An organization that has attested to a set of security controls as a condition of coverage has implicitly told its leadership and board that those controls are in place. If they are not, the gap is not just an insurance problem. It is a governance problem.
The risk picture that leadership believes they are managing is not the actual risk picture. Decisions about investment, about risk tolerance, and about operational constraints are being made against a false baseline. The insurance premium is the symptom; the governance deficit is the disease.
In OT environments, the insurance problem has an additional dimension. Many cyber insurance policies contain exclusions for acts of war, for nation-state attribution, and increasingly for failures that affect operational technology systems in ways that cross into property damage or bodily injury liability. The precise boundary of these exclusions is being litigated. An organization that purchases cyber insurance as a risk transfer mechanism for OT disruption scenarios may be purchasing coverage that does not apply to the scenarios they are most concerned about. Understanding the actual scope of coverage, not the sales presentation but the policy language and the exclusions, is a board-level responsibility in any organization where OT disruption carries material consequence.
The practical implication for security leaders is that cyber insurance should be treated as a governance instrument rather than a financial product. The underwriting process, conducted properly, produces an independent assessment of security control effectiveness that leadership can use alongside internal assessments. The policy terms define minimum control standards that create accountability for maintaining those controls. The claims process, if it ever becomes relevant, is a forcing function for documentation and evidence preservation that security programs should be maintaining regardless. None of this makes insurance a substitute for security investment. But it makes the insurance relationship more valuable than the premium transfer it is typically treated as.
These ideas are available as keynote presentations and executive briefings. Explore speaking topics →