in the business model or business process, as well as 
with advancing technological development. 
Furthermore, this is because cyber risk is heavily 
dependent on soft and hard IT and security 
management factors (Anderson, 2001). 
The workshop`s approach works in two 
directions. On the one hand, the insurer must know 
and understand his risk to offer the customer the best 
possible premium. On the other hand, the insurer is 
interested in the fact that the customer himself 
understands his risk and can use it sensibly. 
The cyber risk depends on many factors. 
Therefore, it is important to know the value of the 
customer. What are these values and what 
information they contain, plays a key role for the 
insurer. Therefore, many business units are 
investigated. It must be ascertained how the control 
of the IT operation works, since this is an 
elementary prerequisite for reliable Information 
Technology. 
Furthermore, the company's safety measures 
must be ascertained. In this case, questioned how 
segments are arranged and separated from one 
another, or what possibilities are used to monitor the 
networks. It is also questioned, for example, whether 
the data centers are physically and adequately 
equipped by the supply devices. 
The company is also asked about its preparation 
against cyber-attacks. Therefore, contact persons 
from business and industrial IT, management 
reporting, contract management, risk management, 
business continuity management, information 
security management, and IT service management 
will be interviewed to assess the overall risk. 
Furthermore, it is essential that the participants 
of the customer company come from different 
departments, since cyber-risks are cross-
departmental risks (Aguilar, 2014). The Chief 
Financial Officer is particularly important as she is 
involved in the management of information security 
from the business point of view and she is usually 
responsible for corporate risk management. 
Next, the Chief Information Security Officer 
(CISO) and the Chief Information Officer (CIO) are 
needed as part of the risk management at the 
operational level, as they must implement most of 
the measures. 
Since the dependency on suppliers and service 
providers is sufficient, the head of purchasing 
department is also an important partner in this 
workshop. 
In this context, the legal department is often 
involved. This is usually also the point of contact 
when dealing with questions of the liability of the 
company in the context of cyber incidents against 
customers. 
During the workshop, the questionnaire is 
developed in cooperation with the responsible 
customer. The questionnaire contains questions 
about the company and closes with the instruction 
on the precontractual obligation to provide 
information. 
Such a questionnaire was developed by the 
insurer Cyber Risk Management Team (experts) and 
is based on the ISO/IEC 27001 standard. 
The questionnaire includes the following areas: 
The company, its business areas and the 
company's key figures are dealt with in several 
points to obtain a quantitative risk approach. 
Within a further section, corporate guidelines 
and procedures are highlighted, and the impact of 
these guidelines on the company employees. 
The specialist also questions whether the 
company allows cashless payments. This has, inter 
alia, an impact on possible claims under the payment 
card industry data security standard (PCI-DSS, 
2016) requirements. 
A next area of concern is the company's 
cooperation with external service providers. 
Furthermore, the customer company is asked if a 
crisis management plan exists and how the company 
behaves in case of a crisis. 
The next question group deals with questions 
about pre-claims within the scope of insurance 
protection and whether known facts have been made 
available to the customers representative. 
Finally, after the company’s data are 
summarized, the desired insurance sums, deductibles 
and sublimit are treated. 
The customers know that cyber risk is of concern 
for every business. Thus, they have also agreed to 
the workshop and have provided their own 
investments in the form of several resources 
conducting the workshop. 
Therefore, the companies appreciate professional 
exchange with the experts. The workshops are 
helpful to understand their own cyber risks and to 
further perform more effective action. Corporate 
management is given transparency over cyber risks. 
This, in turn, helps the IT to gain the necessary 
attention and acceptance as an important department 
in the fight against cyber-risks and not to be 
considered any longer as a cost center. 
The evaluation of the customer portfolio and the 
conduct of the insurability test are carried out by the 
experts in conjunction with the underwriters of the 
insurer after the workshop.
 
SPCS 2017 - International Conference on Signal Processing and Communication Systems