Cyberinsurance is becoming an increasingly costly item on company balance sheets. With insurers and underwriters now demanding to see effective security controls, having a solid application security program could mean very real savings on premiums.
Key takeaways
After years of meteoric growth in the cyberinsurance market alongside a dramatic increase in costly breaches hitting both the insured and uninsured, that market is poised for a reset. Cyberinsurers are seeing their payout costs skyrocket and are on a mission to limit their exposure and make their policies more profitable.
This could be a wake-up call for companies that overly rely on cyberinsurance – particularly those whose executives have become comfortable with the misperception that cyberliability policies are an acceptable substitute for a sound cybersecurity program. As cyberinsurers become more sophisticated in tying premiums and coverage limits to the level of security controls put in place by policyholders, organizations will need to rethink using cyberinsurance as a proverbial security blanket.
This means that to affordably maintain cyberinsurance coverage – and be assured of a payout when incidents happen – companies will have to reliably prove their security controls to insurance companies. And they’ll need to go far beyond basic best practices like having multifactor authentication (MFA) and incident response plans. They’ll need to build out a layered and comprehensive cybersecurity program that also incorporates vulnerability management and application security measures, including regular dynamic application security testing across their entire attack surface.
The pending shake-up in the cyberinsurance industry is already well underway. Last year saw increases in premiums, restrictions of coverage, and limitations in the kinds of policies insurers were willing to offer. A report from The Wall Street Journal in February shows that between 83% and 88% of companies (depending on size) reported cyberinsurance premium increases for the same level of coverage during their most recent renewal periods. Additionally, between 46% and 49% of companies said their coverage terms became more restrictive, and 28% to 45% said that fewer insurers were willing to offer them a policy.
Quarterly percentage jumps in premium rates for cyberinsurance renewals seemed to reach a peak in the U.S. market at the tail end of 2021, with a 34% increase in the fourth quarter, according to an April report from credit and insurance ratings firm Fitch Ratings. On an annual basis, the report shows that the U.S. market saw a 73% increase in premium rates in 2021 and a further 50% jump in 2022. The slight deceleration in premium increases is attributed to a couple of key factors: underwriters becoming savvy about how and when they write policies, and insurance companies actively accounting for security controls demonstrated by their policyholders.
“Insurers serve a role in promoting effective cyberrisk management practices for policyholders and have become more insistent that insureds demonstrate practices that include use of dual factor authentication, diligent system updates and patches, and frequent employee cybertraining as part of the application process,” the Fitch Ratings report explains.
The Wall Street Journal report also states that experts from MunichRe, a global reinsurer, have observed that insurance companies are moving away from questionnaires to underwriting that “relies on using objective, data-driven information on the risk profile of applicants.” For organizations seeking new policies and renewals, factors such as security ratings and risk scoring from firms like RiskLens, SecurityScorecard, and RiskRecon – as well as proven compliance with security standards and guidelines such as the NIST Cybersecurity Framework (CSF) – could count for a whole lot more when negotiating premiums and coverage terms.
Traditionally, the security controls categories most frequently named by insurance companies in their cyberinsurance application forms have been focused on endpoint and network security, including MFA, encryption, incident response, antivirus, and firewalls. While having a DAST solution and other application security tools such as IAST (interactive application security testing) or SCA (software composition analysis) might not check off any of those specific boxes, demonstrating you have an effective application security program could still help optimize cyberinsurance premiums and coverage levels. DAST can be especially useful due to its ability to deploy quickly and test any web application regardless of technology or source code availability. Showing that you have a process for testing applications in development and production could influence cyberinsurance negotiations in a number of ways, both near- and long-term.
Implementing a DAST-based application security program can contribute to reducing cyberinsurance premiums by improving the security posture of web applications and reducing the likelihood of successful cyberattacks. By identifying and fixing vulnerabilities proactively, companies can lower their risk of security breaches and potential financial losses associated with cyberincidents. This can go a long way with insurers – and potentially result in lower premiums or more favorable insurance terms when you’re in the market for cyberinsurance.