Skip to main content

Article

Understanding how a cyber policy would respond to a large data breach

Having an immediately actionable plan for how your organisation would respond to a cyber incident has never been more important. Our Cyber Incident Checklist gives you a straightforward way to do a review or aspects to include to facilitate an incident response exercise.

With some very high profile cyber breach incidents recently, it’s a timely reminder that having an immediately actionable plan for how your organisation would respond to a cyber incident has never been more important. 

There are a number of misconceptions being reported in the media and from other sources in relation to cyber insurance. This document walks through an example policy response from a breach by a 3rd party resulting in the release of personal information, followed by a ransom demand. 

One of the key scenarios that cyber insurance is designed to cover is a data breach. Whilst coverage between insurance policies will vary, outlined are some of the key coverage areas that a dedicated cyber insurance policy may respond to in the event of this type of cyber incident.

Understanding how a cyber insurance policy responds to an incident