in the business model or business process, as well as
with advancing technological development.
Furthermore, this is because cyber risk is heavily
dependent on soft and hard IT and security
management factors (Anderson, 2001).
The workshop`s approach works in two
directions. On the one hand, the insurer must know
and understand his risk to offer the customer the best
possible premium. On the other hand, the insurer is
interested in the fact that the customer himself
understands his risk and can use it sensibly.
The cyber risk depends on many factors.
Therefore, it is important to know the value of the
customer. What are these values and what
information they contain, plays a key role for the
insurer. Therefore, many business units are
investigated. It must be ascertained how the control
of the IT operation works, since this is an
elementary prerequisite for reliable Information
Technology.
Furthermore, the company's safety measures
must be ascertained. In this case, questioned how
segments are arranged and separated from one
another, or what possibilities are used to monitor the
networks. It is also questioned, for example, whether
the data centers are physically and adequately
equipped by the supply devices.
The company is also asked about its preparation
against cyber-attacks. Therefore, contact persons
from business and industrial IT, management
reporting, contract management, risk management,
business continuity management, information
security management, and IT service management
will be interviewed to assess the overall risk.
Furthermore, it is essential that the participants
of the customer company come from different
departments, since cyber-risks are cross-
departmental risks (Aguilar, 2014). The Chief
Financial Officer is particularly important as she is
involved in the management of information security
from the business point of view and she is usually
responsible for corporate risk management.
Next, the Chief Information Security Officer
(CISO) and the Chief Information Officer (CIO) are
needed as part of the risk management at the
operational level, as they must implement most of
the measures.
Since the dependency on suppliers and service
providers is sufficient, the head of purchasing
department is also an important partner in this
workshop.
In this context, the legal department is often
involved. This is usually also the point of contact
when dealing with questions of the liability of the
company in the context of cyber incidents against
customers.
During the workshop, the questionnaire is
developed in cooperation with the responsible
customer. The questionnaire contains questions
about the company and closes with the instruction
on the precontractual obligation to provide
information.
Such a questionnaire was developed by the
insurer Cyber Risk Management Team (experts) and
is based on the ISO/IEC 27001 standard.
The questionnaire includes the following areas:
The company, its business areas and the
company's key figures are dealt with in several
points to obtain a quantitative risk approach.
Within a further section, corporate guidelines
and procedures are highlighted, and the impact of
these guidelines on the company employees.
The specialist also questions whether the
company allows cashless payments. This has, inter
alia, an impact on possible claims under the payment
card industry data security standard (PCI-DSS,
2016) requirements.
A next area of concern is the company's
cooperation with external service providers.
Furthermore, the customer company is asked if a
crisis management plan exists and how the company
behaves in case of a crisis.
The next question group deals with questions
about pre-claims within the scope of insurance
protection and whether known facts have been made
available to the customers representative.
Finally, after the company’s data are
summarized, the desired insurance sums, deductibles
and sublimit are treated.
The customers know that cyber risk is of concern
for every business. Thus, they have also agreed to
the workshop and have provided their own
investments in the form of several resources
conducting the workshop.
Therefore, the companies appreciate professional
exchange with the experts. The workshops are
helpful to understand their own cyber risks and to
further perform more effective action. Corporate
management is given transparency over cyber risks.
This, in turn, helps the IT to gain the necessary
attention and acceptance as an important department
in the fight against cyber-risks and not to be
considered any longer as a cost center.
The evaluation of the customer portfolio and the
conduct of the insurability test are carried out by the
experts in conjunction with the underwriters of the
insurer after the workshop.
SPCS 2017 - International Conference on Signal Processing and Communication Systems