Exploring the complexities of cyber insurance with Harpreet Mann

Executive Summary: Delve into the intricacies of cyber insurance with expert Harpreet Mann, as she sheds light on the challenges of risk assessment and the necessity of aligning cybersecurity practices with insurance policies.​

This article:

  • Features insights from Harpreet Mann on the evolving landscape of cyber insurance.
  • ​Discusses challenges in risk assessment and policy coverage.​
  • Highlights the importance of aligning cybersecurity measures with insurance requirements.

Introduction

In the fourth episode of Resilience Rising, Sean Costigan, Managing Director of Resilience Strategy at Red Sift, delves into the intricacies of cyber insurance with Harpreet Mann, President of Amynta Trade Credit and Political Risk Solutions. Drawing on her extensive experience in insurance and risk management, Harpreet sheds light on the challenges and transformative potential of cyber insurance in today’s rapidly evolving threat landscape.

Navigating the challenges of cyber insurance

Cyber insurance has become a critical method for managing risk in this era of increasing cyberattacks. However, as Harpreet explains, the industry is grappling with a unique combination of high-frequency and high-severity events, including spectacular ransomware attacks, that challenge traditional insurance models. Unlike other insurance lines, which tend to balance low-frequency, high-severity risks or high-frequency, low-severity risks, cyber insurance struggles to maintain profitability under the strain of both. 

Additionally, Harpreet addresses the concept of “silent cyber”—policies that fail to explicitly include or exclude cyber risks. This ambiguity has pushed regulators and insurers alike to clarify coverage terms, a move championed by organizations like Lloyd’s of London. Clear policy language is critical for managing expectations and ensuring alignment between insurers and policyholders.

Incentivizing better cybersecurity practices

One of the transformative opportunities in cyber insurance lies in its ability to drive improved cybersecurity practices. Harpreet explains how insurers reward businesses with robust cybersecurity measures by offering more favorable premiums. This creates a symbiotic relationship where insurers incentivize stronger defenses, ultimately reducing risk exposure for all parties.

However, she notes the challenges faced by smaller and medium-sized enterprises (SMEs), which often struggle to meet the stringent requirements for cyber insurance. Harpreet underscores the potential role of public-private partnerships, including reinsurance backstops, to make cyber insurance more accessible while fostering a culture of shared responsibility. After all, just over a year ago the head of Zurich, Mario Greco, told the Financial Times that cyber was shaping up to be “uninsurable.”

Geopolitical risks and cybersecurity

Our conversation also explores the intersection of geopolitical instability and cybersecurity. Harpreet cites the NotPetya attack on Merck as a stark example of how state-sponsored cyber warfare can destabilize businesses and nations alike. The growing use of cyberattacks as geopolitical tools underscores the need for comprehensive risk management strategies that address both the private and public sectors.

“What’s interesting here is establishing. ‘Okay, what does war mean?’ and if war is between two states, can they draw the line that cyber attack was truly a war act by a state actor.”

Harpeet Mann

President of Amynta Trade Credit and Political Risk Solutions

A path forward for cyber insurance

Looking ahead, Harpreet emphasizes the importance of adaptability in the cyber insurance industry. She envisions a future where insurers, regulators, and businesses collaborate to create more sustainable and precise policies. By addressing challenges such as ransomware coverage and clarifying war exclusions in policies, the industry can better serve its clients while maintaining stability.

“I do think cyber will get there. The question for the industry is, is it a good practice to cover ransomware?”

Harpreet Mann

President of Amynta Trade Credit and Political Risk Solutions

Listen to the full episode

Gain deeper insights from Harpreet Mann on how cyber insurance can evolve to meet today’s challenges by listening to the full episode of Resilience Rising. The discussion offers valuable perspectives for cyber and insurance industry professionals, policymakers, and anyone interested in the future of cybersecurity and risk management.

For more updates and insights, follow:

Stay tuned for more episodes of Resilience Rising as we explore critical topics shaping the cybersecurity landscape.

PUBLISHED BY

Red Sift

14 Jan. 2025

SHARE ARTICLE:

Recent Posts

VIEW ALL
BEC

What is email spoofing and how can you prevent it?

Faisal Misle

Executive summary: Email spoofing is a growing cyber threat where attackers forge the sender’s address to impersonate trusted sources, enabling phishing, business email compromise, and financial fraud. Because legacy email protocols like SMTP lack strong authentication, spoofing can bypass traditional filters. Organizations can mitigate this risk by implementing robust email authentication measures, especially DMARC.…

Read more
Email

What is social engineering and how can you prevent it?

Jack Lilley

Executive summary: Email phishing has evolved and criminals now use social engineering to impersonate executives, suppliers, and even government agencies, persuading recipients to approve payments or disclose credentials. Because human judgment sits at the heart of these attacks, technical controls that eliminate spoofed messages before they reach the inbox are essential. DMARC provides that…

Read more
Cybersecurity

Attackers are abusing Microsoft 365: Here’s how to stay protected

Jack Lilley

Executive summary: Varonis has surfaced an active phishing campaign that spoofs internal users by abusing Microsoft 365’s Direct Send feature. Because Direct Send doesn’t require authentication and is treated as “internal,” these messages often bypass the checks you rely on for outside mail. Microsoft now offers an opt-in switch, RejectDirectSend, to block the pathway,…

Read more
BEC

SVGs with JavaScript are bypassing traditional email security: Learn how to stay…

Jack Lilley

Executive summary: Hackers are hiding JavaScript inside SVG attachments that pass as harmless images, and slipping past Secure Email Gateways (SEGs). To stay secure, organizations need to enforce a DMARC policy of p=reject, easily implemented with Red Sift OnDMARC, to stop compromised SVGs before they reach the end user. Key takeaways: Scalable Vector Graphics…

Read more