<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.bitsight.com/">
  <channel>
    <title>Cyber Insurance</title>
    <link>https://www.bitsight.com/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Gallagher Re's Scanning the Horizon</title>
  <link>https://www.bitsight.com/resources/gallagher-res-scanning-horizon</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Gallagher Re's Scanning the Horizon&lt;/span&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/16" typeof="schema:Person" property="schema:name" datatype&gt;Eric Cisternelli&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2024-10-16T15:21:07-04:00" title="Wednesday, October 16, 2024 - 15:21" class="datetime"&gt;Wed, 10/16/2024 - 15:21&lt;/time&gt;
&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;h3&gt;How broadening our use of cybersecurity data can help insurers&lt;/h3&gt;

&lt;p&gt;Gallagher Re’s 2024 cyber claims correlation study,&amp;nbsp;developed with Bitsight’s data, explores how external cybersecurity scanning data can enhance underwriting accuracy for the (re)insurance industry. By examining over 62,000 companies and 589 million IP addresses, Gallagher Re compares companies’ security controls with actual insurance claims. This study identifies key predictive factors, including IP address count and patching cadence, that help forecast claims. It also introduces Single Point of Failure (SPoF) data, which highlights dependencies on third-party services like AWS and VPNs.&lt;/p&gt;

&lt;p&gt;Key insights from Gallagher Re’s 2024 cyber claims correlation study include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;External scanning data can reduce loss ratios by up to 16.4%.&lt;/li&gt;
	&lt;li&gt;IP address count is a strong predictor of cyber claims, offering valuable insight into company risk profiles.&lt;/li&gt;
	&lt;li&gt;Patching cadence, or the speed at which vulnerabilities are fixed, remains a critical factor in predicting losses.&lt;/li&gt;
	&lt;li&gt;And more!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Download the study for the full findings.&lt;/strong&gt;&lt;/p&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;article class="media media--type-image media--view-mode-original"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/2024/10/16/Gallagher%20Re_Scanning%20the%20Horizon-How%20broadening%20our%20use%20of%20cybersecurity%20data%20can%20help%20insurers-cover.png" width="750" height="496" alt="Gallagher Re_Scanning the Horizon-How broadening our use of cybersecurity data can help insurers whitepaper cover" typeof="foaf:Image"&gt;


              &lt;/div&gt;
      
  &lt;/article&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-gated field--type-boolean field--label-hidden field__item"&gt;
                          Off
              &lt;/div&gt;
      
            &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;article class="media media--type-document media--view-mode-default"&gt;
  
      
  &lt;div class="field field--name-field-media-file field--type-file field--label-visually_hidden"&gt;
    &lt;div class="field__label visually-hidden"&gt;File&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://www.bitsight.com/sites/default/files/2024-10/Gallagher%20Re_Scanning%20the%20Horizon-How%20broadening%20our%20use%20of%20cybersecurity%20data%20can%20help%20insurers.pdf" type="application/pdf"&gt;Gallagher Re_Scanning the Horizon-How broadening our use of cybersecurity data can help insurers.pdf&lt;/a&gt;&lt;/span&gt;

              &lt;/div&gt;
          &lt;/div&gt;

  &lt;/article&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-resource-type field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;a href="https://www.bitsight.com/taxonomy/term/231" hreflang="en"&gt;Research&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;div class="field field--name-field-topics field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;a href="https://www.bitsight.com/taxonomy/term/101" hreflang="en"&gt;Cyber Insurance&lt;/a&gt;
                  &lt;/div&gt;
          &lt;/div&gt;
  
            &lt;div class="field field--name-field-embed field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;div class="background-color--"&gt;
      &lt;div class="container"&gt;
      

    &lt;/div&gt;  
    &lt;div class="block-content block-content--type-embed block-content--30941 block-content--view-mode-default block-content--embed-container"&gt;
    
    
          
      &lt;/div&gt;
&lt;/div&gt;

              &lt;/div&gt;
      
  &lt;div class="field field--name-field-hide-resource-from-lists field--type-boolean field--label-above"&gt;
    &lt;div class="field__label"&gt;Hide Resource from Lists?&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          Off
              &lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-button-text field--type-string field--label-above"&gt;
    &lt;div class="field__label"&gt;Button Text&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          Get Free Copy
              &lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-new field--type-boolean field--label-above"&gt;
    &lt;div class="field__label"&gt;New?&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          YES
              &lt;/div&gt;
          &lt;/div&gt;
</description>
  <pubDate>Wed, 16 Oct 2024 19:21:07 +0000</pubDate>
    <dc:creator>Eric Cisternelli</dc:creator>
    <guid isPermaLink="false">15266 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>As Cyber Insurance Claims Soar, Businesses Need to Demonstrate a Standard of Care</title>
  <link>https://www.bitsight.com/blog/as-cyber-insurance-claims-soar-businesses-need-demonstrate-standard-of-care</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;As Cyber Insurance Claims Soar, Businesses Need to Demonstrate a Standard of Care&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/1" typeof="schema:Person" property="schema:name" datatype&gt;admin_bitsight&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-12-17T13:30:00+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-12-17T08:30:00-05:00" title="Sunday, December 17, 2023 - 08:30" class="datetime"&gt;Sun, 12/17/2023 - 08:30&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--2521 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Hardly a day goes by without the emergence of a disturbing new trend in cyber crime or headline-grabbing hack. Hackers are getting smarter and threat vectors are constantly evolving. The escalating threat is forcing businesses to file more cyber insurance claims than ever. But are they taking the proactive steps necessary to boost their security postures and become a better underwriting risk?&lt;/p&gt;
&lt;!--more--&gt;

&lt;p&gt;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="1b263c08-1711-4014-8e2a-f05773c2a65f" href="https://www.bitsight.com/node/261" rel="noopener" target="_blank"&gt;Cyber insurance&lt;/a&gt; claims double&lt;/p&gt;

&lt;p&gt;According to a&lt;a href="http://www.aig.co.uk/content/dam/aig/emea/regional-assets/documents/aig-cyber-claims-2019.pdf" rel="noopener" target="_blank"&gt; new study&lt;/a&gt; by AIG, claims frequency has spiked significantly. In 2018, there were as many cyber insurance claims as the previous two years combined, with business email compromise (BEC) overtaking ransomware as the primary claim.&lt;/p&gt;

&lt;p&gt;Clearly, cyber insurance is fast becoming a “must-have” for any organization. However, because cyber incidents are becoming more complex and costly for insurers to investigate, companies are under increasing pressure to demonstrate a high standard of care when it comes to their security and third party management programs.&lt;/p&gt;

&lt;p&gt;Insurers are careful to provide coverage to a business that is not aware of its own cyber security risk posture. Therefore, in seeking cyber insurance or filing a claim, companies must demonstrate that they are doing everything they can to protect themselves from attacks.&lt;/p&gt;

&lt;p&gt;Here are some tactics that businesses can take to gain the trust of underwriters and protect themselves from the &lt;a href="https://www.bitsight.com/blog/average-cost-of-cyberattacks-soars-to-4.6-million-per-incident" rel="noopener" target="_blank"&gt;rising cost of cyber crime&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Adopt a hackers viewpoint&lt;/h2&gt;

&lt;p&gt;Organizations must work towards a greater understanding of how hackers see their network, including its systems, high-value targets, and vulnerabilities. By thinking like a cybercriminal and seeing what they see, organizations can better anticipate attacks before they occur.&lt;/p&gt;

&lt;p&gt;To adopt this viewpoint, organizations must be more vigilant in&lt;a href="https://www.bitsight.com/security-performance-management" rel="noopener" target="_blank"&gt; visualizing and quantifying the performance of their cybersecurity program&lt;/a&gt;. With a better understanding of how their security apparatus is performing, organizations can also demonstrate a standard of care to their insurer which is beneficial in the event of a breach or compromise.&lt;/p&gt;

&lt;h2&gt;Be diligent with vendor selection&lt;/h2&gt;

&lt;p&gt;Currently,&lt;a href="https://www.businesswire.com/news/home/20181115005665/en/Opus-Ponemon-Institute-Announce-Results-2018-Third-Party" rel="noopener" target="_blank"&gt; 59%&lt;/a&gt; of breaches originate with third-party vendors. Yet, organizations are struggling to make significant progress in &lt;a href="https://www.bitsight.com/blog/new-study-organizations-struggle-manage-cyber-risk-supply-chains" rel="noopener" target="_blank"&gt;managing cybersecurity risk in their supply chains&lt;/a&gt; because they lack transparency into the security posture of these partners. This blindspot of their enterprise security risk can cause them to fail to secure the right level and type of insurance coverage.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocklibrary"&gt;
    
    
          
&lt;div class="block-content block-content--type-library block-content--22186 block-content--view-mode-full"&gt;
  
  
  &lt;div class="block-content__content"&gt;
    
            &lt;div class="field field--name-field-block field--type-entity-reference field--label-hidden field__item"&gt;
                          






&lt;div class="block-content block-content--type-cta block-content--22121 block-content--view-mode-default"&gt;
  
  
      




  



&lt;div class="card--with-header card--media-right card--image-bottom"&gt;
  
  
  
  &lt;article class="card  "&gt;
    &lt;div class="card__inner-wrapper container "&gt;

                        &lt;div class="card__media"&gt;
            &lt;div class="card__media-screenshot"&gt;
              &lt;div class="card__circle-container"&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;div class="media-wrapper "&gt;
                              
      &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;article class="media media--type-image media--view-mode-cta"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/styles/cta/public/2023/06/13/How%20Bitsight%20Helps%20you%20get%20insurance%20coverage%20CTA.png?itok=CHSD-Mmg" width="570" height="377" alt="How Bitsight Helps you get insurance coverage" typeof="foaf:Image" class="image-style-cta"&gt;



              &lt;/div&gt;
      
  &lt;/article&gt;

                  &lt;/div&gt;
          &lt;/div&gt;
  
              
                          &lt;/div&gt;
          &lt;/div&gt;
        
              
      &lt;div class="card__content"&gt;
                
                  &lt;div class="card__heading"&gt;
            

  &lt;h2 class="heading card__title heading--white card__title--normal heading__without-link "&gt;
          How Bitsight Helps You Get Cyber Insurance Coverage
          &lt;/h2&gt;
          &lt;/div&gt;
        
        
                  &lt;div class="card__summary"&gt;
              &lt;div class="body-text"&gt;
              
            &lt;div class="clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item"&gt;
                          &lt;p&gt;The average cost of a ransomware attack is $1.85 million and 22 days to recover. If you’re looking for cyber insurance coverage to protect yourself, download our ebook to learn how to strengthen your cybersecurity program to influence coverage.&lt;/p&gt;

              &lt;/div&gt;
      
        
  &lt;/div&gt;
          &lt;/div&gt;
        
                  &lt;div class="card__cta"&gt;
                          &lt;div class="card__button"&gt;
                


  &lt;a href="https://www.bitsight.com/resources/how-bitsight-helps-you-get-cyber-insurance-coverage" class="button card__button button--filled-white" aria-label&gt;Download eBook
    
      &lt;/a&gt;
              &lt;/div&gt;
            
            
                      &lt;/div&gt;
              &lt;/div&gt;
    &lt;/div&gt;
  &lt;/article&gt;
    &lt;/div&gt;
  &lt;/div&gt;

              &lt;/div&gt;
      
  &lt;/div&gt;
&lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--6956 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Rather than be handicapped by their inability to identify risky vendors and potential third-party vulnerabilities, organizations can use &lt;a href="https://www.bitsight.com/security-ratings" rel="noopener" target="_blank"&gt;security ratings&lt;/a&gt; to quickly identify risk in their &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0d3dc750-3fc1-4649-b98a-f243c7488e2a" href="https://www.bitsight.com/blog/what-is-digital-supply-chain-management"&gt;digital supply chain&lt;/a&gt; and help put procedures in place to protect their organization from an attack and demonstrate due diligence to insurers.&lt;/p&gt;

&lt;h2&gt;Turn the C-suite’s gaze beyond the headlines&lt;/h2&gt;

&lt;p&gt;In a dynamic threat environment, it’s all too easy for the C-suite and Board of Directors to get distracted by the latest headlines and steer resources in a reactive manner. But risks are always changing - today it’s phishing scams, but tomorrow it may be something else. Executives can’t afford to lose sight of the long term threat picture, or else risk a significant hit to their &lt;a href="https://www.bitsight.com/blog/cloud-security-lessons-learned-from-capital-one-data-breach" rel="noopener" target="_blank"&gt;organizations’ reputations&lt;/a&gt; or &lt;a href="https://www.bitsight.com/blog/gdpr-shows-its-teeth-goes-after-breached-companies" rel="noopener" target="_blank"&gt;heavy fines&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;CISOs&lt;a href="https://www.bitsight.com/blog/its-time-for-cisos-to-take-a-seat-at-the-table" rel="noopener" target="_blank"&gt; must look beyond the four walls of the SOC&lt;/a&gt; and build bridges with other stakeholders, including the CEO, CTO, and legal counsel, to clearly and succinctly articulate how cybersecurity impacts their organization and the value and limits of their cyber insurance program. Simultaneously, CISOs can’t be insulated, either; they must be continually vigilant about potential risks that may fall outside of their purview.&lt;/p&gt;

&lt;h2&gt;Don’t turn insurance into a catch-all&lt;/h2&gt;

&lt;p&gt;Cyber insurance has become a necessary component of doing business, but it can’t be a catch-all. Companies still need to be proactive in their approach to security, less insurance fails to adequately cover their risk exposure. Organizations must show the insurers that they’re serious about security by implementing a prolonged and proactive approach to risk management.&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sun, 17 Dec 2023 13:30:00 +0000</pubDate>
    <dc:creator>admin_bitsight</dc:creator>
    <guid isPermaLink="false">2191 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>What is Cyber Insurance Underwriting?</title>
  <link>https://www.bitsight.com/blog/what-cyber-insurance-underwriting</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;What is Cyber Insurance Underwriting?&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/71" typeof="schema:Person" property="schema:name" datatype content="rachel.holmes@bitsight.com"&gt;rachel.holmes@…&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-12-15T09:30:00+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-12-15T04:30:00-05:00" title="Friday, December 15, 2023 - 04:30" class="datetime"&gt;Fri, 12/15/2023 - 04:30&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--19291 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Cyber insurance underwriting is a process that insurance companies rely on to assess client risk, evaluate exposure, and model losses, such as the cost to recover from a data breach, ransomware attack, or other malicious cyber activity.&lt;/p&gt;

&lt;p&gt;Due to a rise in claims (many of them stemming from the surge in ransomware), the underwriting process has changed significantly in recent years. As a result, insurers are revisiting their policies and enhancing their risk assessment processes.&lt;/p&gt;

&lt;p&gt;If you’re getting ready to purchase &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="1b263c08-1711-4014-8e2a-f05773c2a65f" href="https://www.bitsight.com/node/261"&gt;cyber insurance&lt;/a&gt; or renew an existing policy, here’s how you can secure the right coverage.&lt;/p&gt;

&lt;h2&gt;Why Your Organization Needs Cyber Insurance&lt;/h2&gt;

&lt;p&gt;Every organization is vulnerable to a cyber attack. If you become a victim, cyber insurance can cover the cost your business may incur as result of the incident. Cyber insurance typically covers a common set of scenarios and impacts, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Data loss&lt;/li&gt;
	&lt;li&gt;Business interruption&lt;/li&gt;
	&lt;li&gt;Lost profits&lt;/li&gt;
	&lt;li&gt;Extortion and ransom payments&lt;/li&gt;
	&lt;li&gt;Fines and penalties imposed by regulators&lt;/li&gt;
	&lt;li&gt;Reputation management&lt;/li&gt;
	&lt;li&gt;Credit and identity monitoring services for those impacted by a breach&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cyber insurance can also support and defend your organization from any legal liability arising from those affected by the incident, such as customers, employees, vendors, and business partners.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--19281 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;h2&gt;How Cyber Insurance Underwriting Has Evolved&lt;/h2&gt;

&lt;p&gt;As cyber attacks have become more commonplace and the frequency of claims has grown, the process of cyber insurance underwriting has evolved significantly.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To reduce risk and potential losses, insurers are becoming more diligent about risk assessment during the application process and throughout the life of the policy. They want to know what measures your organization is taking to protect against cyber attacks and mitigate their impact—and they are turning to technology for answers.&lt;/p&gt;

&lt;p&gt;In addition to relying on traditional methods such as &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a8bf4d89-435d-443f-abbb-9193b5eec208" href="https://www.bitsight.com/blog/vendor-risk-management-questionnaire-template"&gt;risk assessment questionnaires&lt;/a&gt;, which are often subjective and hard to verify, today’s sophisticated underwriting technology can shine a light on your security posture in a non-invasive and data-driven way. These tools can help underwriters &lt;a href="https://www.bitsight.com/financial-quantification-for-enterprise-cyber-risk"&gt;evaluate the financial impact of a cyber attack on your business&lt;/a&gt;, &lt;a href="https://www.bitsight.com/resources/peer-analytics-security-performance-management-datasheet"&gt;compare your security performance to others in your sector&lt;/a&gt;, and &lt;a href="https://www.bitsight.com/uses/cyber-insurance"&gt;assess cyber risk in your supply chain&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Once a policy is secured, insurers can &lt;a href="https://www.bitsight.com/uses/continuous-monitoring"&gt;continuously monitor&lt;/a&gt; your organization's cybersecurity health and keep a pulse on emerging risk throughout the period of coverage.&lt;/p&gt;

&lt;h2&gt;What Risks Do Cyber Insurance Underwriters Look For?&lt;/h2&gt;

&lt;p&gt;Many hackers rely on network and system vulnerabilities such as &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="9b396c21-fb4b-405f-9335-c433857107ed" href="https://www.bitsight.com/blog/open-port-vulnerabilities-whats-the-big-deal"&gt;open ports&lt;/a&gt;, unpatched software, and misconfigured systems for their attacks. Insurers want to know that your organization is taking steps to understand and act on these risks. A failure to do so may result in a higher premium or declined coverage.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Other elements of a mature and established security management program that underwriters look for are a robust data management strategy, multi-factor authentication, network segmentation, and endpoint protection.&lt;/p&gt;

&lt;p&gt;To ensure you can procure the right policy at the right cost, use a tool like &lt;a href="https://www.bitsight.com/security-ratings"&gt;Bitsight Security Ratings&lt;/a&gt;. Bitsight provides a complete view of hidden risk in your network and across your integrated &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0d3dc750-3fc1-4649-b98a-f243c7488e2a" href="https://www.bitsight.com/blog/what-is-digital-supply-chain-management"&gt;supply chain&lt;/a&gt;, so that you can remediate it before it becomes an issue and help reduce potential cyber risk insurance claims in the future. Additionally, 50% of global cyber insurance gross written premiums are underwritten by Bitsight customers including &lt;a href="https://www.aig.com/business/insurance/cyber"&gt;AIG&lt;/a&gt;, &lt;a href="https://www.chubb.com/us-en/business-insurance/privacy-network-security.html"&gt;Chubb&lt;/a&gt;, and &lt;a href="https://www.thehartford.com/commercial-insurance-agents/resources-cyber-liability"&gt;Hartford&lt;/a&gt;.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Prepare For Your Cyber Insurance Application&lt;/h2&gt;

&lt;p&gt;When applying for cyber insurance or renewing a policy, preparation can ensure the best outcome. Engage multiple teams including security, IT, compliance, and legal—each has a role to play in providing timely input.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Next, begin gathering the information that potential insurance companies will need. Your list should include relevant data points that prove your organization’s commitment to sound cybersecurity.&lt;/p&gt;

&lt;p&gt;Bitsight Security Ratings are a great way to prove your &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="45b28929-1729-4fc6-ba38-eff7ab8af7ec" href="https://www.bitsight.com/glossary/digital-risk-protection"&gt;digital risk protection&lt;/a&gt; efforts to a cyber risk insurance provider. Presenting an external, objective view of your network’s &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="7822162c-7d1a-42e0-8225-ef52efd5d96e" href="https://www.bitsight.com/glossary/cybersecurity-posture"&gt;cybersecurity posture&lt;/a&gt; will give your potential insurance provider a trusted view into what your organization does to protect from threats, and will make securing a cyber risk insurance policy smoother.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ensure Your Policy Covers Relevant Risks&lt;/h2&gt;

&lt;p&gt;Before you sign on the dotted line, study your insurer’s contractual wording to avoid any misunderstanding of what is covered and what’s excluded. For example, if your organization is hit by ransomware and chooses to pay the ransom, verify that your organization is protected against those financial losses. Another common exclusion are state-sponsored cyber-attacks. If you’re in a high-risk sector, such as &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="04abbc78-37bf-41e3-8b4c-3456d064fdc0" href="https://www.bitsight.com/glossary/critical-infrastructure-cybersecurity"&gt;critical infrastructure&lt;/a&gt;, technology, or finance, this form of coverage is crucial.&lt;/p&gt;

&lt;p&gt;Read more about &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a56a674f-ed17-47f3-bc54-ab251ca1b14d" href="https://www.bitsight.com/blog/cyber-risk-insurance-coverage"&gt;cyber insurance, what is and isn’t covered&lt;/a&gt;, and other things to look for in an insurer.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blockaccordion"&gt;
    
    
          &lt;div class="accordion_background background-color--"&gt;
  
&lt;/div&gt;
&lt;div class="block-content block-content--type-accordion block-content--25026 block-content--view-mode-full horizontal-align container"&gt;
  
  
  &lt;div class="accordion__wrapper container"&gt;
                  

  &lt;h2 class="heading accordion__title heading--section heading__without-link "&gt;
          
            &lt;div class="field field--name-field-title field--type-string field--label-hidden field__item"&gt;
                          Cyber Insurance FAQs
              &lt;/div&gt;
      
          &lt;/h2&gt;
            

&lt;section itemscope itemtype="https://schema.org/FAQPage" class&gt;
            
      &lt;div class="field field--name-field-accordion-item field--type-entity-reference-revisions field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                
&lt;article class="accordion"&gt;
  &lt;div itemscope itemprop="mainEntity" itemtype="https://schema.org/Question"&gt;
    &lt;button type="button" class="accordion__toggle" aria-controls="accordion__content-" aria-expanded="false" id="accordion__toggle-" aria-selected="false"&gt;
      &lt;span class="accordion__heading" itemprop="name"&gt;
        
            &lt;div class="field field--name-field-title field--type-string field--label-hidden field__item"&gt;
                          What Is Cyber Insurance?
              &lt;/div&gt;
      
      &lt;/span&gt;
      &lt;span class="accordion__icon"&gt;
        &lt;span class="icon-closed"&gt;  &lt;div class="icon "&gt;
    &lt;svg width="24" height="24" viewBox="0 0 24 24" fill="none"&gt;
&lt;path d="M12 3V21M3 12H21" stroke="#F94917" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" /&gt;
&lt;/svg&gt;
  &lt;/div&gt;
&lt;/span&gt;
        &lt;span class="icon-open"&gt;  &lt;div class="icon "&gt;
    &lt;svg width="25" height="24" viewBox="0 0 25 24" fill="none"&gt;
&lt;path d="M3.45703 12H21.9225" stroke="#F94917" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" /&gt;
&lt;/svg&gt;
  &lt;/div&gt;
&lt;/span&gt;
      &lt;/span&gt;
    &lt;/button&gt;
    &lt;div class="accordion__content" id="accordion__content-" aria-hidden="true" aria-labelledby="accordion__content-" itemscope itemprop="acceptedAnswer" itemtype="https://schema.org/Answer"&gt;
      &lt;div itemprop="text"&gt;
            
            &lt;div class="clearfix text-formatted field field--name-field-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Cyber insurance is a policy intended to protect businesses from financial loss associated with a breach of privacy, breach of network security, network interruption, systems failure, or cyber extortion. Cyber losses are typically excluded from — or remain “silent” within (meaning that they are neither specifically granted nor specifically excluded) — traditional property and casualty insurance policies.&lt;/p&gt;

              &lt;/div&gt;
      
    
        &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/article&gt;

                  &lt;/div&gt;
              &lt;div class="field__item clearfix"&gt;
                                
&lt;article class="accordion"&gt;
  &lt;div itemscope itemprop="mainEntity" itemtype="https://schema.org/Question"&gt;
    &lt;button type="button" class="accordion__toggle" aria-controls="accordion__content-" aria-expanded="false" id="accordion__toggle-" aria-selected="false"&gt;
      &lt;span class="accordion__heading" itemprop="name"&gt;
        
            &lt;div class="field field--name-field-title field--type-string field--label-hidden field__item"&gt;
                          What does Cyber Insurance cover?
              &lt;/div&gt;
      
      &lt;/span&gt;
      &lt;span class="accordion__icon"&gt;
        &lt;span class="icon-closed"&gt;  &lt;div class="icon "&gt;
    &lt;svg width="24" height="24" viewBox="0 0 24 24" fill="none"&gt;
&lt;path d="M12 3V21M3 12H21" stroke="#F94917" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" /&gt;
&lt;/svg&gt;
  &lt;/div&gt;
&lt;/span&gt;
        &lt;span class="icon-open"&gt;  &lt;div class="icon "&gt;
    &lt;svg width="25" height="24" viewBox="0 0 25 24" fill="none"&gt;
&lt;path d="M3.45703 12H21.9225" stroke="#F94917" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" /&gt;
&lt;/svg&gt;
  &lt;/div&gt;
&lt;/span&gt;
      &lt;/span&gt;
    &lt;/button&gt;
    &lt;div class="accordion__content" id="accordion__content-" aria-hidden="true" aria-labelledby="accordion__content-" itemscope itemprop="acceptedAnswer" itemtype="https://schema.org/Answer"&gt;
      &lt;div itemprop="text"&gt;
            
            &lt;div class="clearfix text-formatted field field--name-field-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Coverage provided in a cyber insurance policy may include both first party expense coverage and third party liability coverage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First Party – Expenses&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Services: Computer forensics, legal, PR, breach notification, and credit monitoring expenses&lt;/li&gt;
	&lt;li&gt;Ransom demands&lt;/li&gt;
	&lt;li&gt;Data restoration expenses&lt;/li&gt;
	&lt;li&gt;Extra expenses incurred to run the business during a network interruption or systems failure (direct or contingent)&lt;/li&gt;
	&lt;li&gt;Revenue loss arising out of a network interruption or systems failure (direct or contingent)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Third Party – Liability&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Fines and penalties&lt;/li&gt;
	&lt;li&gt;Defense costs, judgements, or settlements (class actions)&lt;/li&gt;
&lt;/ul&gt;

              &lt;/div&gt;
      
    
        &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/article&gt;

                  &lt;/div&gt;
              &lt;div class="field__item clearfix"&gt;
                                
&lt;article class="accordion"&gt;
  &lt;div itemscope itemprop="mainEntity" itemtype="https://schema.org/Question"&gt;
    &lt;button type="button" class="accordion__toggle" aria-controls="accordion__content-" aria-expanded="false" id="accordion__toggle-" aria-selected="false"&gt;
      &lt;span class="accordion__heading" itemprop="name"&gt;
        
            &lt;div class="field field--name-field-title field--type-string field--label-hidden field__item"&gt;
                           Who Needs Cyber Insurance?
              &lt;/div&gt;
      
      &lt;/span&gt;
      &lt;span class="accordion__icon"&gt;
        &lt;span class="icon-closed"&gt;  &lt;div class="icon "&gt;
    &lt;svg width="24" height="24" viewBox="0 0 24 24" fill="none"&gt;
&lt;path d="M12 3V21M3 12H21" stroke="#F94917" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" /&gt;
&lt;/svg&gt;
  &lt;/div&gt;
&lt;/span&gt;
        &lt;span class="icon-open"&gt;  &lt;div class="icon "&gt;
    &lt;svg width="25" height="24" viewBox="0 0 25 24" fill="none"&gt;
&lt;path d="M3.45703 12H21.9225" stroke="#F94917" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" /&gt;
&lt;/svg&gt;
  &lt;/div&gt;
&lt;/span&gt;
      &lt;/span&gt;
    &lt;/button&gt;
    &lt;div class="accordion__content" id="accordion__content-" aria-hidden="true" aria-labelledby="accordion__content-" itemscope itemprop="acceptedAnswer" itemtype="https://schema.org/Answer"&gt;
      &lt;div itemprop="text"&gt;
            
            &lt;div class="clearfix text-formatted field field--name-field-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Any company that operates a network or computer system, or relies on other companies to run their network or computer system.&lt;/p&gt;

              &lt;/div&gt;
      
    
        &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/article&gt;

                  &lt;/div&gt;
          &lt;/div&gt;
  
        &lt;/section&gt;
      &lt;/div&gt;
&lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 15 Dec 2023 09:30:00 +0000</pubDate>
    <dc:creator>rachel.holmes@bitsight.com</dc:creator>
    <guid isPermaLink="false">10191 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>Glass Doors Make Everyone More Secure</title>
  <link>https://www.bitsight.com/resources/glass-doors-make-everyone-more-secure</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Glass Doors Make Everyone More Secure&lt;/span&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/16" typeof="schema:Person" property="schema:name" datatype&gt;Eric Cisternelli&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-11-22T11:35:40-05:00" title="Wednesday, November 22, 2023 - 11:35" class="datetime"&gt;Wed, 11/22/2023 - 11:35&lt;/time&gt;
&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;No company is an island anymore, and enterprises typically have hundreds and even thousands of vendors. To complicate the matrix of interconnectivity, most companies are themselves within the supply chain, or at a minimum, clients for businesses, including cyber insurers. Organizations struggle to understand the risks within their supply chain because of a lack of transparency beyond their own organization, and often don’t have a good sense of their own &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="b9db9f19-461a-40e1-a832-f8e6a624ad2b" href="https://www.bitsight.com/glossary/security-posture-meaning"&gt;security posture&lt;/a&gt; or the effectiveness of their controls.&lt;/p&gt;

&lt;p&gt;Download this webinar and watch Chris Poulin, Director of Technology and Strategy and Deputy CTO at Bitsight, share how to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Assess the security program and controls of your vendors using observable data;&lt;/li&gt;
	&lt;li&gt;Manage your cybersecurity reputation as a competitive advantage;&lt;/li&gt;
	&lt;li&gt;Right-size your insurance limits and premiums.&lt;/li&gt;
&lt;/ul&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;article class="media media--type-image media--view-mode-original"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/2023/11/22/Glass%20Doors%20Make%20Everyone%20More%20Secure.jpg" width="930" height="523" alt="Glass Doors Make Everyone More Secure" typeof="foaf:Image"&gt;


              &lt;/div&gt;
      
  &lt;/article&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-gated field--type-boolean field--label-hidden field__item"&gt;
                          On
              &lt;/div&gt;
      
            &lt;div class="field field--name-field-salesforce-id field--type-string field--label-hidden field__item"&gt;
                          701Hn000001GHd6IAG
              &lt;/div&gt;
      
            &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;article class="media media--type-video media--view-mode-default"&gt;
  
      
            &lt;div class="field field--name-field-media-video-embed-field field--type-video-embed-field field--label-hidden field__item"&gt;
                          
&lt;div class="video-embed-field-provider-wistia-video"&gt;
&lt;div class="wistia_video wistia_embed wistia_async_bs3h3oj7qc" data-wistia-video-id="bs3h3oj7qc"&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;

              &lt;/div&gt;
      
  &lt;/article&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-resource-type field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;a href="https://www.bitsight.com/taxonomy/term/256" hreflang="en"&gt;Webinars&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;div class="field field--name-field-topics field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;a href="https://www.bitsight.com/taxonomy/term/211" hreflang="en"&gt;Third Party Risk Management&lt;/a&gt;
                  &lt;/div&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;a href="https://www.bitsight.com/taxonomy/term/216" hreflang="en"&gt;Vendor Risk Management&lt;/a&gt;
                  &lt;/div&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;a href="https://www.bitsight.com/taxonomy/term/101" hreflang="en"&gt;Cyber Insurance&lt;/a&gt;
                  &lt;/div&gt;
          &lt;/div&gt;
  
            &lt;div class="field field--name-field-embed field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;div class="background-color--"&gt;
      &lt;div class="container"&gt;
      

    &lt;/div&gt;  
    &lt;div class="block-content block-content--type-embed block-content--27156 block-content--view-mode-default block-content--embed-container"&gt;
    
    
          
      &lt;/div&gt;
&lt;/div&gt;

              &lt;/div&gt;
      
  &lt;div class="field field--name-field-hide-resource-from-lists field--type-boolean field--label-above"&gt;
    &lt;div class="field__label"&gt;Hide Resource from Lists?&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          Off
              &lt;/div&gt;
          &lt;/div&gt;

            &lt;div class="field field--name-field-webform field--type-webform field--label-hidden field__item"&gt;
                          &lt;span id="webform-submission-resource-node-13091-form-ajax-content"&gt;&lt;/span&gt;&lt;div id="webform-submission-resource-node-13091-form-ajax" class="webform-ajax-form-wrapper" data-effect="fade" data-progress-type="throbber"&gt;

&lt;form class="webform-submission-form webform-submission-add-form webform-submission-resource-form webform-submission-resource-add-form webform-submission-resource-node-13091-form webform-submission-resource-node-13091-add-form js-webform-details-toggle webform-details-toggle enable-clientside-validation antibot" data-drupal-selector="webform-submission-resource-node-13091-add-form" data-action="/taxonomy/term/101/feed" action="https://www.bitsight.com/antibot" method="post" id="webform-submission-resource-node-13091-add-form" accept-charset="UTF-8"&gt;
  
  &lt;ul class="webform__fields"&gt;
    
&lt;div class="webform-submission-form--inner"&gt;&lt;noscript&gt;
  &lt;div class="antibot-no-js antibot-message antibot-message-warning"&gt;You must have JavaScript enabled to use this form.&lt;/div&gt;
&lt;/noscript&gt;
&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-first-name form-item-first-name"&gt;
          &lt;label for="edit-first-name" class="js-form-required form-required"&gt;First Name&lt;/label&gt;
                
&lt;input class="text" data-drupal-selector="edit-first-name" data-msg-maxlength="First Name field has a maximum length of 255." data-msg-required="First Name field is required." type="text" id="edit-first-name" name="first_name" value required="required" aria-required="true"&gt;

                  &lt;/div&gt;
&lt;/li&gt;&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-last-name form-item-last-name"&gt;
          &lt;label for="edit-last-name" class="js-form-required form-required"&gt;Last Name&lt;/label&gt;
                
&lt;input class="text" data-drupal-selector="edit-last-name" data-msg-maxlength="Last Name field has a maximum length of 255." data-msg-required="Last Name field is required." type="text" id="edit-last-name" name="last_name" value required="required" aria-required="true"&gt;

                  &lt;/div&gt;
&lt;/li&gt;&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-phone form-item-phone"&gt;
          &lt;label for="edit-phone" class="js-form-required form-required"&gt;Phone&lt;/label&gt;
                
&lt;input class="text" data-drupal-selector="edit-phone" data-msg-maxlength="Phone field has a maximum length of 255." data-msg-required="Phone field is required." type="text" id="edit-phone" name="phone" value required="required" aria-required="true"&gt;

                  &lt;/div&gt;
&lt;/li&gt;&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-email form-type-email js-form-item-company-email form-item-company-email"&gt;
      &lt;label for="edit-company-email" class="js-form-required form-required"&gt;Company Email&lt;/label&gt;
        
&lt;input placeholder="Enter Email Address" class="text" data-drupal-selector="edit-company-email" data-msg-email="Company Email does not contain a valid email." data-msg-maxlength="Company Email field has a maximum length of 254." data-msg-required="Company Email field is required." type="email" id="edit-company-email" name="company_email" value required="required" aria-required="true"&gt;

        &lt;/div&gt;

&lt;/li&gt;
&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-company-name form-item-company-name"&gt;
          &lt;label for="edit-company-name" class="js-form-required form-required"&gt;Company Name&lt;/label&gt;
                
&lt;input class="text" data-drupal-selector="edit-company-name" data-msg-maxlength="Company Name field has a maximum length of 255." data-msg-required="Company Name field is required." type="text" id="edit-company-name" name="company_name" value required="required" aria-required="true"&gt;

                  &lt;/div&gt;
&lt;/li&gt;&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-job-title form-item-job-title"&gt;
          &lt;label for="edit-job-title" class="js-form-required form-required"&gt;Job Title&lt;/label&gt;
                
&lt;input class="text" data-counter-type="character" data-counter-minimum="1" data-counter-maximum="40" data-counter-maximum-message="Min 1 character/Max 40 characters" minlength="1" data-drupal-selector="edit-job-title" data-msg-maxlength="Job Title field has a maximum length of 40." data-msg-required="Job Title field is required." type="text" id="edit-job-title" name="job_title" value required="required" aria-required="true"&gt;

                  &lt;/div&gt;
&lt;/li&gt;&lt;input data-drupal-selector="edit-sfdccampaignid" type="hidden" name="sfdccampaignid" value="[current-page:query:sfdcCampaignId]"&gt;
&lt;input data-drupal-selector="edit-utm-source" type="hidden" name="utm_source" value="(direct)"&gt;
&lt;input data-drupal-selector="edit-utm-medium" type="hidden" name="utm_medium" value="(none)"&gt;
&lt;input data-drupal-selector="edit-utm-campaignid" type="hidden" name="utm_campaignid" value&gt;
&lt;input data-drupal-selector="edit-utm-campaign" type="hidden" name="utm_campaign" value&gt;
&lt;input data-drupal-selector="edit-utm-adgroup" type="hidden" name="utm_adgroup" value&gt;
&lt;input data-drupal-selector="edit-utm-adgroupid" type="hidden" name="utm_adgroupid" value&gt;
&lt;input data-drupal-selector="edit-utm-term" type="hidden" name="utm_term" value&gt;
&lt;input data-drupal-selector="edit-utm-matchtype" type="hidden" name="utm_matchtype" value&gt;
&lt;input data-drupal-selector="edit-utm-content" type="hidden" name="utm_content" value&gt;
&lt;input data-drupal-selector="edit-ga-source" type="hidden" name="ga_source" value&gt;
&lt;input data-drupal-selector="edit-ga-medium" type="hidden" name="ga_medium" value&gt;
&lt;input data-drupal-selector="edit-ga-campaign" type="hidden" name="ga_campaign" value&gt;
&lt;input data-drupal-selector="edit-ga-term" type="hidden" name="ga_term" value&gt;
&lt;input data-drupal-selector="edit-ga-content" type="hidden" name="ga_content" value&gt;
&lt;input data-drupal-selector="edit-gclid" type="hidden" name="gclid" value&gt;
&lt;input data-drupal-selector="edit-leadsource" type="hidden" name="leadsource" value="Resource Center"&gt;
&lt;input data-drupal-selector="edit-latest-conversion-source" type="hidden" name="latest_conversion_source" value="Resource Center"&gt;
&lt;input data-drupal-selector="edit-benchmarking-report-link" type="hidden" name="benchmarking_report_link" value&gt;
&lt;input data-drupal-selector="edit-ga-landing-page" type="hidden" name="ga_landing_page" value&gt;
&lt;input data-drupal-selector="edit-ga-conversion-page" type="hidden" name="ga_conversion_page" value&gt;
&lt;input data-drupal-selector="edit-state" type="hidden" name="state" value&gt;
&lt;li&gt;
  &lt;div class="js-form-item form-item js-form-type-select form-type-select js-form-item-country form-item-country"&gt;
          &lt;label for="edit-country" class="js-form-required form-required"&gt;Country&lt;/label&gt;
                &lt;div class="select-container"&gt;&lt;select class="form-select required" data-drupal-selector="edit-country" data-msg-required="Country field is required." id="edit-country" name="country" required="required" aria-required="true"&gt;&lt;option value selected="selected"&gt;- Select -&lt;/option&gt;&lt;option value="AX"&gt;Aland Islands&lt;/option&gt;&lt;option value="AL"&gt;Albania&lt;/option&gt;&lt;option value="DZ"&gt;Algeria&lt;/option&gt;&lt;option value="AD"&gt;Andorra&lt;/option&gt;&lt;option value="AO"&gt;Angola&lt;/option&gt;&lt;option value="AI"&gt;Anguilla&lt;/option&gt;&lt;option value="AQ"&gt;Antarctica&lt;/option&gt;&lt;option value="AG"&gt;Antigua and Barbuda&lt;/option&gt;&lt;option value="AR"&gt;Argentina&lt;/option&gt;&lt;option value="AM"&gt;Armenia&lt;/option&gt;&lt;option value="AW"&gt;Aruba&lt;/option&gt;&lt;option value="AU"&gt;Australia&lt;/option&gt;&lt;option value="AT"&gt;Austria&lt;/option&gt;&lt;option value="AZ"&gt;Azerbaijan&lt;/option&gt;&lt;option value="BS"&gt;Bahamas&lt;/option&gt;&lt;option value="BH"&gt;Bahrain&lt;/option&gt;&lt;option value="BB"&gt;Barbados&lt;/option&gt;&lt;option value="BE"&gt;Belgium&lt;/option&gt;&lt;option value="BZ"&gt;Belize&lt;/option&gt;&lt;option value="BJ"&gt;Benin&lt;/option&gt;&lt;option value="BM"&gt;Bermuda&lt;/option&gt;&lt;option value="BT"&gt;Bhutan&lt;/option&gt;&lt;option value="BO"&gt;Bolivia, Plurinational State of&lt;/option&gt;&lt;option value="BQ"&gt;Bonaire, Sint Eustatius and Saba&lt;/option&gt;&lt;option value="BA"&gt;Bosnia and Herzegovina&lt;/option&gt;&lt;option value="BW"&gt;Botswana&lt;/option&gt;&lt;option value="BV"&gt;Bouvet Island&lt;/option&gt;&lt;option value="BR"&gt;Brazil&lt;/option&gt;&lt;option value="IO"&gt;British Indian Ocean Territory&lt;/option&gt;&lt;option value="BN"&gt;Brunei Darussalam&lt;/option&gt;&lt;option value="BG"&gt;Bulgaria&lt;/option&gt;&lt;option value="BF"&gt;Burkina Faso&lt;/option&gt;&lt;option value="BI"&gt;Burundi&lt;/option&gt;&lt;option value="CM"&gt;Cameroon&lt;/option&gt;&lt;option value="CA"&gt;Canada&lt;/option&gt;&lt;option value="CV"&gt;Cape Verde&lt;/option&gt;&lt;option value="KY"&gt;Cayman Islands&lt;/option&gt;&lt;option value="CF"&gt;Central African Republic&lt;/option&gt;&lt;option value="TD"&gt;Chad&lt;/option&gt;&lt;option value="CL"&gt;Chile&lt;/option&gt;&lt;option value="CX"&gt;Christmas Island&lt;/option&gt;&lt;option value="CC"&gt;Cocos (Keeling) Islands&lt;/option&gt;&lt;option value="CO"&gt;Colombia&lt;/option&gt;&lt;option value="CK"&gt;Cook Islands&lt;/option&gt;&lt;option value="CR"&gt;Costa Rica&lt;/option&gt;&lt;option value="CI"&gt;Cote d'Ivoire&lt;/option&gt;&lt;option value="HR"&gt;Croatia&lt;/option&gt;&lt;option value="CW"&gt;Curaçao&lt;/option&gt;&lt;option value="CY"&gt;Cyprus&lt;/option&gt;&lt;option value="CZ"&gt;Czech Republic&lt;/option&gt;&lt;option value="DK"&gt;Denmark&lt;/option&gt;&lt;option value="DJ"&gt;Djibouti&lt;/option&gt;&lt;option value="DM"&gt;Dominica&lt;/option&gt;&lt;option value="DO"&gt;Dominican Republic&lt;/option&gt;&lt;option value="EC"&gt;Ecuador&lt;/option&gt;&lt;option value="EG"&gt;Egypt&lt;/option&gt;&lt;option value="SV"&gt;El Salvador&lt;/option&gt;&lt;option value="GQ"&gt;Equatorial Guinea&lt;/option&gt;&lt;option value="EE"&gt;Estonia&lt;/option&gt;&lt;option value="ET"&gt;Ethiopia&lt;/option&gt;&lt;option value="FK"&gt;Falkland Islands (Malvinas)&lt;/option&gt;&lt;option value="FO"&gt;Faroe Islands&lt;/option&gt;&lt;option value="FJ"&gt;Fiji&lt;/option&gt;&lt;option value="FI"&gt;Finland&lt;/option&gt;&lt;option value="FR"&gt;France&lt;/option&gt;&lt;option value="GF"&gt;French Guiana&lt;/option&gt;&lt;option value="PF"&gt;French Polynesia&lt;/option&gt;&lt;option value="TF"&gt;French Southern Territories&lt;/option&gt;&lt;option value="GA"&gt;Gabon&lt;/option&gt;&lt;option value="GM"&gt;Gambia&lt;/option&gt;&lt;option value="GE"&gt;Georgia&lt;/option&gt;&lt;option value="DE"&gt;Germany&lt;/option&gt;&lt;option value="GH"&gt;Ghana&lt;/option&gt;&lt;option value="GI"&gt;Gibraltar&lt;/option&gt;&lt;option value="GR"&gt;Greece&lt;/option&gt;&lt;option value="GL"&gt;Greenland&lt;/option&gt;&lt;option value="GD"&gt;Grenada&lt;/option&gt;&lt;option value="GP"&gt;Guadeloupe&lt;/option&gt;&lt;option value="GU"&gt;Guam&lt;/option&gt;&lt;option value="GT"&gt;Guatemala&lt;/option&gt;&lt;option value="GG"&gt;Guernsey&lt;/option&gt;&lt;option value="GN"&gt;Guinea&lt;/option&gt;&lt;option value="GW"&gt;Guinea-Bissau&lt;/option&gt;&lt;option value="GY"&gt;Guyana&lt;/option&gt;&lt;option value="HT"&gt;Haiti&lt;/option&gt;&lt;option value="HM"&gt;Heard Island and McDonald Islands&lt;/option&gt;&lt;option value="VA"&gt;Holy See (Vatican City State)&lt;/option&gt;&lt;option value="HN"&gt;Honduras&lt;/option&gt;&lt;option value="HK"&gt;Hong Kong&lt;/option&gt;&lt;option value="HU"&gt;Hungary&lt;/option&gt;&lt;option value="IS"&gt;Iceland&lt;/option&gt;&lt;option value="IN"&gt;India&lt;/option&gt;&lt;option value="ID"&gt;Indonesia&lt;/option&gt;&lt;option value="IE"&gt;Ireland&lt;/option&gt;&lt;option value="IM"&gt;Isle of Man&lt;/option&gt;&lt;option value="IL"&gt;Israel&lt;/option&gt;&lt;option value="IT"&gt;Italy&lt;/option&gt;&lt;option value="JM"&gt;Jamaica&lt;/option&gt;&lt;option value="JP"&gt;Japan&lt;/option&gt;&lt;option value="JE"&gt;Jersey&lt;/option&gt;&lt;option value="JO"&gt;Jordan&lt;/option&gt;&lt;option value="KZ"&gt;Kazakhstan&lt;/option&gt;&lt;option value="KE"&gt;Kenya&lt;/option&gt;&lt;option value="KI"&gt;Kiribati&lt;/option&gt;&lt;option value="KR"&gt;Korea, Republic of&lt;/option&gt;&lt;option value="XK"&gt;Kosovo&lt;/option&gt;&lt;option value="KW"&gt;Kuwait&lt;/option&gt;&lt;option value="KG"&gt;Kyrgyzstan&lt;/option&gt;&lt;option value="LA"&gt;Lao People's Democratic Republic&lt;/option&gt;&lt;option value="LV"&gt;Latvia&lt;/option&gt;&lt;option value="LS"&gt;Lesotho&lt;/option&gt;&lt;option value="LR"&gt;Liberia&lt;/option&gt;&lt;option value="LI"&gt;Liechtenstein&lt;/option&gt;&lt;option value="LT"&gt;Lithuania&lt;/option&gt;&lt;option value="LU"&gt;Luxembourg&lt;/option&gt;&lt;option value="MO"&gt;Macao&lt;/option&gt;&lt;option value="MK"&gt;Macedonia, the former Yugoslav Republic of&lt;/option&gt;&lt;option value="MG"&gt;Madagascar&lt;/option&gt;&lt;option value="MW"&gt;Malawi&lt;/option&gt;&lt;option value="MY"&gt;Malaysia&lt;/option&gt;&lt;option value="MV"&gt;Maldives&lt;/option&gt;&lt;option value="ML"&gt;Mali&lt;/option&gt;&lt;option value="MT"&gt;Malta&lt;/option&gt;&lt;option value="MQ"&gt;Martinique&lt;/option&gt;&lt;option value="MR"&gt;Mauritania&lt;/option&gt;&lt;option value="MU"&gt;Mauritius&lt;/option&gt;&lt;option value="YT"&gt;Mayotte&lt;/option&gt;&lt;option value="MX"&gt;Mexico&lt;/option&gt;&lt;option value="MD"&gt;Moldova, Republic of&lt;/option&gt;&lt;option value="MC"&gt;Monaco&lt;/option&gt;&lt;option value="MN"&gt;Mongolia&lt;/option&gt;&lt;option value="ME"&gt;Montenegro&lt;/option&gt;&lt;option value="MS"&gt;Montserrat&lt;/option&gt;&lt;option value="MA"&gt;Morocco&lt;/option&gt;&lt;option value="MZ"&gt;Mozambique&lt;/option&gt;&lt;option value="NA"&gt;Namibia&lt;/option&gt;&lt;option value="NR"&gt;Nauru&lt;/option&gt;&lt;option value="NP"&gt;Nepal&lt;/option&gt;&lt;option value="NL"&gt;Netherlands&lt;/option&gt;&lt;option value="NC"&gt;New Caledonia&lt;/option&gt;&lt;option value="NZ"&gt;New Zealand&lt;/option&gt;&lt;option value="NE"&gt;Niger&lt;/option&gt;&lt;option value="NG"&gt;Nigeria&lt;/option&gt;&lt;option value="NU"&gt;Niue&lt;/option&gt;&lt;option value="NF"&gt;Norfolk Island&lt;/option&gt;&lt;option value="NO"&gt;Norway&lt;/option&gt;&lt;option value="OM"&gt;Oman&lt;/option&gt;&lt;option value="PK"&gt;Pakistan&lt;/option&gt;&lt;option value="PS"&gt;Palestine&lt;/option&gt;&lt;option value="PA"&gt;Panama&lt;/option&gt;&lt;option value="PG"&gt;Papua New Guinea&lt;/option&gt;&lt;option value="PY"&gt;Paraguay&lt;/option&gt;&lt;option value="PE"&gt;Peru&lt;/option&gt;&lt;option value="PH"&gt;Philippines&lt;/option&gt;&lt;option value="PN"&gt;Pitcairn&lt;/option&gt;&lt;option value="PL"&gt;Poland&lt;/option&gt;&lt;option value="PT"&gt;Portugal&lt;/option&gt;&lt;option value="QA"&gt;Qatar&lt;/option&gt;&lt;option value="RE"&gt;Reunion&lt;/option&gt;&lt;option value="RO"&gt;Romania&lt;/option&gt;&lt;option value="RW"&gt;Rwanda&lt;/option&gt;&lt;option value="BL"&gt;Saint Barthélemy&lt;/option&gt;&lt;option value="SH"&gt;Saint Helena, Ascension and Tristan da Cunha&lt;/option&gt;&lt;option value="KN"&gt;Saint Kitts and Nevis&lt;/option&gt;&lt;option value="LC"&gt;Saint Lucia&lt;/option&gt;&lt;option value="MF"&gt;Saint Martin (French part)&lt;/option&gt;&lt;option value="PM"&gt;Saint Pierre and Miquelon&lt;/option&gt;&lt;option value="VC"&gt;Saint Vincent and the Grenadines&lt;/option&gt;&lt;option value="WS"&gt;Samoa&lt;/option&gt;&lt;option value="SM"&gt;San Marino&lt;/option&gt;&lt;option value="ST"&gt;Sao Tome and Principe&lt;/option&gt;&lt;option value="SA"&gt;Saudi Arabia&lt;/option&gt;&lt;option value="SN"&gt;Senegal&lt;/option&gt;&lt;option value="RS"&gt;Serbia&lt;/option&gt;&lt;option value="SC"&gt;Seychelles&lt;/option&gt;&lt;option value="SL"&gt;Sierra Leone&lt;/option&gt;&lt;option value="SG"&gt;Singapore&lt;/option&gt;&lt;option value="SX"&gt;Sint Maarten (Dutch part)&lt;/option&gt;&lt;option value="SK"&gt;Slovakia&lt;/option&gt;&lt;option value="SI"&gt;Slovenia&lt;/option&gt;&lt;option value="SB"&gt;Solomon Islands&lt;/option&gt;&lt;option value="ZA"&gt;South Africa&lt;/option&gt;&lt;option value="GS"&gt;South Georgia and the South Sandwich Islands&lt;/option&gt;&lt;option value="ES"&gt;Spain&lt;/option&gt;&lt;option value="LK"&gt;Sri Lanka&lt;/option&gt;&lt;option value="SR"&gt;Suriname&lt;/option&gt;&lt;option value="SJ"&gt;Svalbard and Jan Mayen&lt;/option&gt;&lt;option value="SZ"&gt;Swaziland&lt;/option&gt;&lt;option value="SE"&gt;Sweden&lt;/option&gt;&lt;option value="CH"&gt;Switzerland&lt;/option&gt;&lt;option value="TW"&gt;Taiwan&lt;/option&gt;&lt;option value="TJ"&gt;Tajikistan&lt;/option&gt;&lt;option value="TZ"&gt;Tanzania, United Republic of&lt;/option&gt;&lt;option value="TH"&gt;Thailand&lt;/option&gt;&lt;option value="TL"&gt;Timor-Leste&lt;/option&gt;&lt;option value="TG"&gt;Togo&lt;/option&gt;&lt;option value="TK"&gt;Tokelau&lt;/option&gt;&lt;option value="TO"&gt;Tonga&lt;/option&gt;&lt;option value="TT"&gt;Trinidad and Tobago&lt;/option&gt;&lt;option value="TN"&gt;Tunisia&lt;/option&gt;&lt;option value="TR"&gt;Turkey&lt;/option&gt;&lt;option value="TM"&gt;Turkmenistan&lt;/option&gt;&lt;option value="TC"&gt;Turks and Caicos Islands&lt;/option&gt;&lt;option value="TV"&gt;Tuvalu&lt;/option&gt;&lt;option value="UG"&gt;Uganda&lt;/option&gt;&lt;option value="UA"&gt;Ukraine&lt;/option&gt;&lt;option value="AE"&gt;United Arab Emirates&lt;/option&gt;&lt;option value="GB"&gt;United Kingdom&lt;/option&gt;&lt;option value="US"&gt;United States&lt;/option&gt;&lt;option value="UY"&gt;Uruguay&lt;/option&gt;&lt;option value="UZ"&gt;Uzbekistan&lt;/option&gt;&lt;option value="VU"&gt;Vanuatu&lt;/option&gt;&lt;option value="VN"&gt;Viet Nam&lt;/option&gt;&lt;option value="VG"&gt;Virgin Islands, British&lt;/option&gt;&lt;option value="WF"&gt;Wallis and Futuna&lt;/option&gt;&lt;option value="EH"&gt;Western Sahara&lt;/option&gt;&lt;option value="ZM"&gt;Zambia&lt;/option&gt;&lt;/select&gt;&lt;/div&gt;
                  &lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
  &lt;div class="js-webform-states-hidden js-form-item form-item js-form-type-select form-type-select js-form-item-us-state form-item-us-state"&gt;
          &lt;label for="edit-us-state"&gt;State&lt;/label&gt;
                &lt;div class="select-container"&gt;&lt;select class="form-select" data-drupal-selector="edit-us-state" data-msg-required="State field is required." id="edit-us-state" name="us_state" data-drupal-states="{&amp;quot;visible&amp;quot;:{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;US&amp;quot;}},&amp;quot;required&amp;quot;:{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;US&amp;quot;}}}"&gt;&lt;option value selected="selected"&gt;- Select -&lt;/option&gt;&lt;option value="Alabama"&gt;Alabama&lt;/option&gt;&lt;option value="Alaska"&gt;Alaska&lt;/option&gt;&lt;option value="Arizona"&gt;Arizona&lt;/option&gt;&lt;option value="Arkansas"&gt;Arkansas&lt;/option&gt;&lt;option value="California"&gt;California&lt;/option&gt;&lt;option value="Colorado"&gt;Colorado&lt;/option&gt;&lt;option value="Connecticut"&gt;Connecticut&lt;/option&gt;&lt;option value="Delaware"&gt;Delaware&lt;/option&gt;&lt;option value="District of Columbia"&gt;District of Columbia&lt;/option&gt;&lt;option value="Florida"&gt;Florida&lt;/option&gt;&lt;option value="Georgia"&gt;Georgia&lt;/option&gt;&lt;option value="Hawaii"&gt;Hawaii&lt;/option&gt;&lt;option value="Idaho"&gt;Idaho&lt;/option&gt;&lt;option value="Illinois"&gt;Illinois&lt;/option&gt;&lt;option value="Indiana"&gt;Indiana&lt;/option&gt;&lt;option value="Iowa"&gt;Iowa&lt;/option&gt;&lt;option value="Kansas"&gt;Kansas&lt;/option&gt;&lt;option value="Kentucky"&gt;Kentucky&lt;/option&gt;&lt;option value="Louisiana"&gt;Louisiana&lt;/option&gt;&lt;option value="Maine"&gt;Maine&lt;/option&gt;&lt;option value="Maryland"&gt;Maryland&lt;/option&gt;&lt;option value="Massachusetts"&gt;Massachusetts&lt;/option&gt;&lt;option value="Michigan"&gt;Michigan&lt;/option&gt;&lt;option value="Minnesota"&gt;Minnesota&lt;/option&gt;&lt;option value="Mississippi"&gt;Mississippi&lt;/option&gt;&lt;option value="Missouri"&gt;Missouri&lt;/option&gt;&lt;option value="Montana"&gt;Montana&lt;/option&gt;&lt;option value="Nebraska"&gt;Nebraska&lt;/option&gt;&lt;option value="Nevada"&gt;Nevada&lt;/option&gt;&lt;option value="New Hampshire"&gt;New Hampshire&lt;/option&gt;&lt;option value="New Jersey"&gt;New Jersey&lt;/option&gt;&lt;option value="New Mexico"&gt;New Mexico&lt;/option&gt;&lt;option value="New York"&gt;New York&lt;/option&gt;&lt;option value="North Carolina"&gt;North Carolina&lt;/option&gt;&lt;option value="North Dakota"&gt;North Dakota&lt;/option&gt;&lt;option value="Ohio"&gt;Ohio&lt;/option&gt;&lt;option value="Oklahoma"&gt;Oklahoma&lt;/option&gt;&lt;option value="Oregon"&gt;Oregon&lt;/option&gt;&lt;option value="Pennsylvania"&gt;Pennsylvania&lt;/option&gt;&lt;option value="Rhode Island"&gt;Rhode Island&lt;/option&gt;&lt;option value="South Carolina"&gt;South Carolina&lt;/option&gt;&lt;option value="South Dakota"&gt;South Dakota&lt;/option&gt;&lt;option value="Tennessee"&gt;Tennessee&lt;/option&gt;&lt;option value="Texas"&gt;Texas&lt;/option&gt;&lt;option value="Utah"&gt;Utah&lt;/option&gt;&lt;option value="Vermont"&gt;Vermont&lt;/option&gt;&lt;option value="Virginia"&gt;Virginia&lt;/option&gt;&lt;option value="Washington"&gt;Washington&lt;/option&gt;&lt;option value="West Virginia"&gt;West Virginia&lt;/option&gt;&lt;option value="Wisconsin"&gt;Wisconsin&lt;/option&gt;&lt;option value="Wyoming"&gt;Wyoming&lt;/option&gt;&lt;/select&gt;&lt;/div&gt;
                  &lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
  &lt;div class="js-webform-states-hidden js-form-item form-item js-form-type-select form-type-select js-form-item-ca-province form-item-ca-province"&gt;
          &lt;label for="edit-ca-province"&gt;Province&lt;/label&gt;
                &lt;div class="select-container"&gt;&lt;select class="form-select" data-drupal-selector="edit-ca-province" data-msg-required="Province field is required." id="edit-ca-province" name="ca_province" data-drupal-states="{&amp;quot;visible&amp;quot;:{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;CA&amp;quot;}},&amp;quot;required&amp;quot;:{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;CA&amp;quot;}}}"&gt;&lt;option value selected="selected"&gt;- Select -&lt;/option&gt;&lt;option value="Alberta"&gt;Alberta&lt;/option&gt;&lt;option value="British Columbia"&gt;British Columbia&lt;/option&gt;&lt;option value="Manitoba"&gt;Manitoba&lt;/option&gt;&lt;option value="New Brunswick"&gt;New Brunswick&lt;/option&gt;&lt;option value="Newfoundland and Labrador"&gt;Newfoundland and Labrador&lt;/option&gt;&lt;option value="Nova Scotia"&gt;Nova Scotia&lt;/option&gt;&lt;option value="Northwest Territories"&gt;Northwest Territories&lt;/option&gt;&lt;option value="Nunavut"&gt;Nunavut&lt;/option&gt;&lt;option value="Ontario"&gt;Ontario&lt;/option&gt;&lt;option value="Prince Edward Island"&gt;Prince Edward Island&lt;/option&gt;&lt;option value="Quebec"&gt;Quebec&lt;/option&gt;&lt;option value="Saskatchewan"&gt;Saskatchewan&lt;/option&gt;&lt;option value="Yukon"&gt;Yukon&lt;/option&gt;&lt;/select&gt;&lt;/div&gt;
                  &lt;/div&gt;
&lt;/li&gt;
&lt;div class="js-webform-states-hidden js-form-wrapper" data-drupal-states="{&amp;quot;visible&amp;quot;:{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;US&amp;quot;},&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022us_state\u0022]&amp;quot;:{&amp;quot;!value&amp;quot;:&amp;quot;California&amp;quot;}}}"&gt;&lt;div class="js-form-item form-item js-form-type-webform-markup form-type-webform-markup js-form-item-us-message form-item-us-message form-no-label" id="edit-us-message"&gt;
        &lt;p&gt;We will use your information to communicate with you about this contact form and other solutions and related resources that may be of interest to you. You may unsubscribe at any time. For more information, please see our &lt;a data-renderer-mark="true" data-testid="link-with-safety" href="https://www.bitsight.com/privacy-policy" title="http://www.bitsight.com/privacy-policy"&gt;Privacy Policy&lt;/a&gt;.&lt;/p&gt;
        &lt;/div&gt;
&lt;/div&gt;
&lt;li class="webform-checkbox-li"&gt;
  &lt;div class="webform__checkbox-container"&gt;
    &lt;div class="webform-element--title-inline js-form-item form-item js-form-type-checkbox form-type-checkbox js-form-item-marketing-email-consent form-item-marketing-email-consent" data-webform-states-no-clear&gt;
                        &lt;input data-drupal-selector="edit-marketing-email-consent" aria-describedby="edit-marketing-email-consent--description" type="checkbox" id="edit-marketing-email-consent" name="marketing_email_consent" value="1" class="form-checkbox" data-drupal-states="{&amp;quot;visible&amp;quot;:[{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022us_state\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;California&amp;quot;}},&amp;quot;or&amp;quot;,{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;!value&amp;quot;:&amp;quot;US&amp;quot;}}],&amp;quot;checked&amp;quot;:{&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022us_state\u0022]&amp;quot;:{&amp;quot;!value&amp;quot;:&amp;quot;California&amp;quot;},&amp;quot;.webform-submission-resource-node-13091-add-form :input[name=\u0022country\u0022]&amp;quot;:{&amp;quot;value&amp;quot;:&amp;quot;US&amp;quot;}}}"&gt;

                    &lt;label for="edit-marketing-email-consent" class="option"&gt;Marketing Consent&lt;/label&gt;&lt;img class="webform__required-asterisk" src="https://www.bitsight.com/themes/custom/bitsight_theme/src/assets/required.svg" alt="required"&gt;
                                  &lt;div class="webform__checkbox__read-more-container"&gt;
          &lt;a class="webform__read-more-link" href="#"&gt;Read more&lt;/a&gt;
            &lt;div class="webform__read-more-text"&gt;
              
&lt;div id="edit-marketing-email-consent--description" class="webform-element-description"&gt;I consent to sharing this information with BitSight Technologies, Inc. (“Bitsight”) for sales and marketing communications, as detailed in our &lt;a href="http://www.bitsight.com/privacy-policy"&gt;Privacy Policy&lt;/a&gt;. I understand I may unsubscribe.&lt;/div&gt;

            &lt;/div&gt;
        &lt;/div&gt;
          &lt;/div&gt;
  &lt;/div&gt;
&lt;/li&gt;
&lt;input data-drupal-selector="edit-antibot-key" type="hidden" name="antibot_key" value&gt;
&lt;input autocomplete="off" data-drupal-selector="form-2zxpghvh19456thozqj7jldrzaib8dg3qyt9fbbfmo4" type="hidden" name="form_build_id" value="form-2ZxPGHVH19456thoZQJ7jldRzAiB8DG3QYt9FBBFmO4"&gt;
&lt;input data-drupal-selector="edit-webform-submission-resource-node-13091-add-form" type="hidden" name="form_id" value="webform_submission_resource_node_13091_add_form"&gt;
&lt;input data-drupal-selector="edit-honeypot-time" type="hidden" name="honeypot_time" value="Hmu68M0lOzGpgvL4m-F7TGJ2z6850lUm-0MyZE1Y4rU"&gt;

&lt;div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions"&gt;
&lt;div class="webform__button"&gt;
  


  &lt;input class="webform-button--submit button--shine button button--primary js-form-submit form-submit" data-drupal-selector="edit-submit" data-disable-refocus="true" type="submit" id="edit-submit" name="op" value="Submit" aria-label&gt;
  
&lt;/div&gt;

&lt;/div&gt;

&lt;div class="middle_name-textfield js-form-wrapper form-wrapper" style="display: none !important;"&gt;&lt;div class="js-form-item form-item js-form-type-textfield form-type-textfield js-form-item-middle-name form-item-middle-name"&gt;
      &lt;label for="edit-middle-name"&gt;Leave this field blank&lt;/label&gt;
        
&lt;input class="text" autocomplete="off" data-drupal-selector="edit-middle-name" data-msg-maxlength="Leave this field blank field has a maximum length of 128." type="text" id="edit-middle-name" name="middle_name" value&gt;

        &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

  &lt;/ul&gt;
  
&lt;/form&gt;
&lt;/div&gt;
              &lt;/div&gt;
      
  &lt;div class="field field--name-field-button-text field--type-string field--label-above"&gt;
    &lt;div class="field__label"&gt;Button Text&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          Watch Webinar
              &lt;/div&gt;
          &lt;/div&gt;
</description>
  <pubDate>Wed, 22 Nov 2023 16:35:40 +0000</pubDate>
    <dc:creator>Eric Cisternelli</dc:creator>
    <guid isPermaLink="false">13091 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>These 14 cybersecurity analytics can help you make better cyber insurance decisions</title>
  <link>https://www.bitsight.com/blog/these-14-cybersecurity-analytics-can-help-you-make-better-cyber-insurance-decisions</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;These 14 cybersecurity analytics can help you make better cyber insurance decisions&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/16" typeof="schema:Person" property="schema:name" datatype&gt;Eric Cisternelli&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-10-14T13:00:00+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-10-14T09:00:00-04:00" title="Saturday, October 14, 2023 - 09:00" class="datetime"&gt;Sat, 10/14/2023 - 09:00&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--23761 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Cybersecurity continues to be a top risk for business and government leaders worldwide. In addition to reputational damage and lost business, the direct financial costs of a cyber incident continue to rise. Ransomware payment costs are up nearly 10% from the first quarter of 2022; and in 2021, U.S. banks &lt;a href="https://www.cnbc.com/2022/11/01/us-banks-process-roughly-1point2-billion-in-ransomware-payments-in-2021.html"&gt;processed&lt;/a&gt; roughly $1.2 billion in ransomware payments. The rising cost and &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d3f12011-c4d5-4b2a-a984-22f7fb9d01f7" href="https://www.bitsight.com/glossary/cybersecurity-likelihood-of-attack"&gt;likelihood of experiencing a cybersecurity incident&lt;/a&gt; has made &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a2c62898-6c28-46f6-8852-e20786a9c73c" href="https://www.bitsight.com/blog/what-cyber-insurance-underwriting"&gt;cyber insurance&lt;/a&gt; a popular option for organizations seeking risk transfer solutions.&lt;/p&gt;

&lt;p&gt;Cyber insurance decisions should be supported by trusted, objective data, but this has been far from the status quo:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Security professionals have historically relied on cumbersome and lengthy &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="ccdac7ef-f121-42aa-a83e-99db994beb67" href="https://www.bitsight.com/blog/7-cybersecurity-frameworks-to-reduce-cyber-risk"&gt;cybersecurity frameworks&lt;/a&gt; to improve insurability&lt;/li&gt;
	&lt;li&gt;Insurers have struggled to ascertain and analyze unbiased, trusted, and objective datasets to help inform loss models and pricing decisions&lt;/li&gt;
	&lt;li&gt;Brokers need reliable statistics to help clients make the best decisions regarding pricing, scope, and terms&lt;/li&gt;
&lt;/ul&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="margin-top block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--23766 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;h2&gt;More than ever before, the market needs a set of trusted cybersecurity analytics on which to focus.&lt;/h2&gt;

&lt;p&gt;A new independent &lt;a href="https://www.bitsight.com/blog/new-study-finds-significant-correlation-between-bitsight-analytics-and-cybersecurity-incidents"&gt;study&lt;/a&gt; by the world’s largest insurance broker, Marsh McLennan, found 14 Bitsight analytics to be significantly correlated with cybersecurity incidents, helping organizations prioritize initiatives to measurably reduce the risk of an incident. These &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="3cb125d0-7274-4bbf-b600-ed5a4ab82c40" href="https://www.bitsight.com/products/advanced-analytics"&gt;cybersecurity analytics&lt;/a&gt; fill an important gap in the market, allowing cyber insurers, insureds, and brokers to make decisions more closely tied to tangible outcomes.&lt;/p&gt;

&lt;p&gt;To dive deeper into the analysis and what it means for the &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a2c62898-6c28-46f6-8852-e20786a9c73c" href="https://www.bitsight.com/blog/what-cyber-insurance-underwriting"&gt;cyber insurance&lt;/a&gt; industry, Bitsight’s Aaron Aanenson, senior director of cyber insurance thought leadership, sat down for an interview with Noah Stone, senior manager of thought leadership.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stone&lt;/strong&gt;: Aaron, I’m excited to discuss this important research with you. To kick us off, what’s the purpose of this study and how did Marsh McLennan’s Cyber Risk Analytics Center (Marsh McLennan) approach the logic behind it?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aanenson&lt;/strong&gt;: The primary objective of this study was to further enhance the value of Bitsight’s cyber risk data for both the cyber insurance community and the broader cybersecurity industry. First, &lt;strong&gt;this enables &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a2c62898-6c28-46f6-8852-e20786a9c73c" href="https://www.bitsight.com/blog/what-cyber-insurance-underwriting"&gt;cyber insurance underwriters&lt;/a&gt; to more easily synthesize the significant amount of risk data they analyze when they underwrite accounts&lt;/strong&gt;. Second, it empowers cybersecurity leaders and risk managers to have clear data to articulate and support their cybersecurity risk strategies and budgets.&lt;/p&gt;

&lt;p&gt;The study makes this possible by correlating &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="d3f12011-c4d5-4b2a-a984-22f7fb9d01f7" href="https://www.bitsight.com/glossary/cybersecurity-likelihood-of-attack"&gt;likelihood of breach&lt;/a&gt; with performance in the cybersecurity risk areas that Bitsight measures, thereby &lt;strong&gt;allowing leaders to prioritize which areas of cybersecurity should be optimized for the greatest return on investment&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Insurance customers are interested in this study for these purposes, especially in the current cyber insurance environment where cyber coverage is increasingly challenging to obtain and maintain at a cost that makes sense for risk transfer strategies. Marsh McLennan independently conducted this study by comparing Bitsight’s risk vector ratings and the topline Bitsight Security Rating to their proprietary exposure and loss database. Then, using a statistical technique called “rank biserial correlation,” they quantified the relationship between Bitsight analytics and their loss data to produce the output you see in our report.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stone&lt;/strong&gt;: What exactly did Marsh McLennan find in their independent analysis, and why do you think it’s relevant to the cyber insurance industry?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aanenson&lt;/strong&gt;: Marsh McLennan found a significant correlation between 14 Bitsight analytics (13 risk vectors and the Bitsight Security Rating) and cybersecurity incidents. This data is incredibly valuable for cyber insurers because it provides objective data that the industry currently lacks. Other lines of insurance rely on decades, if not centuries, of historical risk data to make fairly reliable predictions for the future.&lt;/p&gt;

&lt;p&gt;Cyber insurance faces unique challenges because most cyber incident data is kept private. And, the short history of claims data available to carriers demonstrates that the cyber claims of the past are drastically different from the cyber claims we see today. Since cyber threats change so quickly, we don’t necessarily need decades of claims data to inform underwriting decisions but the underwriting still needs to rely on current, reliable datasets that can be tied to losses in order to produce a viable and valuable insurance product.&lt;/p&gt;

&lt;p&gt;Overall, &lt;strong&gt;this data enhances confidence in the predictability of losses&lt;/strong&gt; which is critical to support the capacity of providers, underpinning the ability of insurance carriers to issue cyber insurance coverage.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocklibrary"&gt;
    
    
          
&lt;div class="block-content block-content--type-library block-content--23771 block-content--view-mode-full"&gt;
  
  
  &lt;div class="block-content__content"&gt;
    
            &lt;div class="field field--name-field-block field--type-entity-reference field--label-hidden field__item"&gt;
                          






&lt;div class="block-content block-content--type-cta block-content--22121 block-content--view-mode-default"&gt;
  
  
      




  



&lt;div class="card--with-header card--media-right card--image-bottom"&gt;
  
  
  
  &lt;article class="card  "&gt;
    &lt;div class="card__inner-wrapper container "&gt;

                        &lt;div class="card__media"&gt;
            &lt;div class="card__media-screenshot"&gt;
              &lt;div class="card__circle-container"&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;div class="media-wrapper "&gt;
                              
      &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;article class="media media--type-image media--view-mode-cta"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/styles/cta/public/2023/06/13/How%20Bitsight%20Helps%20you%20get%20insurance%20coverage%20CTA.png?itok=CHSD-Mmg" width="570" height="377" alt="How Bitsight Helps you get insurance coverage" typeof="foaf:Image" class="image-style-cta"&gt;



              &lt;/div&gt;
      
  &lt;/article&gt;

                  &lt;/div&gt;
          &lt;/div&gt;
  
              
                          &lt;/div&gt;
          &lt;/div&gt;
        
              
      &lt;div class="card__content"&gt;
                
                  &lt;div class="card__heading"&gt;
            

  &lt;h2 class="heading card__title heading--white card__title--normal heading__without-link "&gt;
          How Bitsight Helps You Get Cyber Insurance Coverage
          &lt;/h2&gt;
          &lt;/div&gt;
        
        
                  &lt;div class="card__summary"&gt;
              &lt;div class="body-text"&gt;
              
            &lt;div class="clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item"&gt;
                          &lt;p&gt;The average cost of a ransomware attack is $1.85 million and 22 days to recover. If you’re looking for cyber insurance coverage to protect yourself, download our ebook to learn how to strengthen your cybersecurity program to influence coverage.&lt;/p&gt;

              &lt;/div&gt;
      
        
  &lt;/div&gt;
          &lt;/div&gt;
        
                  &lt;div class="card__cta"&gt;
                          &lt;div class="card__button"&gt;
                


  &lt;a href="https://www.bitsight.com/resources/how-bitsight-helps-you-get-cyber-insurance-coverage" class="button card__button button--filled-white" aria-label&gt;Download eBook
    
      &lt;/a&gt;
              &lt;/div&gt;
            
            
                      &lt;/div&gt;
              &lt;/div&gt;
    &lt;/div&gt;
  &lt;/article&gt;
    &lt;/div&gt;
  &lt;/div&gt;

              &lt;/div&gt;
      
  &lt;/div&gt;
&lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--23776 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;&lt;strong&gt;Stone&lt;/strong&gt;: Predictability is definitely an important element here, especially when so many cyber claims datasets skew towards geographic, sector, size, and other biases. How can cyber insurers utilize the data in their day-to-day business building activities?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aanenson&lt;/strong&gt;: When underwriting cyber insurance coverage, underwriters are significantly challenged by the sheer amount of data to analyze, which spans areas like the application, a plethora of cyber risk information, prior claims, peer analyses, and industry trends. &lt;strong&gt;Using the information in this study, underwriters can save time and make better decisions by&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Prioritizing accounts having higher Bitsight ratings and creating underwriting criteria based on those falling into certain segments (e.g. those with high ratings have less underwriting requirements; those in the middle have more; and those with low ratings maybe aren’t quoted or are non-renewed).&lt;/li&gt;
	&lt;li&gt;Focusing underwriting decisions on the Bitsight risk vectors that are most highly correlated to breach.&lt;/li&gt;
	&lt;li&gt;Providing transparent feedback to insureds interested in improving their cyber insurance outcomes by focusing on the Bitsight risk vectors that are most significantly affecting their Bitsight rating.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Stone&lt;/strong&gt;: How do you envision the cyber insurance landscape changing as a result of this research?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aanenson&lt;/strong&gt;: To me, &lt;strong&gt;the data is so strong that it seems possible to automate part of the cyber insurance underwriting process&lt;/strong&gt;. Automation is critical for cyber carriers looking to insure SMEs, which represent the largest portion of the market with the most opportunity right now. In many cases, this segment can’t be insured profitably if the underwriting process isn’t automated in some fashion.&lt;/p&gt;

&lt;p&gt;For larger risks, this data can be used to make better underwriting decisions faster, which can lead to better use of underwriters’ time and better hit ratios in an increasingly competitive industry.&lt;/p&gt;

&lt;p&gt;And overall, with even greater confidence in the cyber risk data that Bitsight provides, we will be fulfilling our company’s mission, which is to make the digital economy a safer place for all of us. This research helps us get there by identifying cyber risk where we can, and integrating that data into tangible outcomes that produce informed and effective &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="99c7158b-feb8-4a2f-8c3e-741451fa3c28" href="https://www.bitsight.com/glossary/cybersecurity-investment"&gt;cybersecurity investments&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stone&lt;/strong&gt;: How do you think security professionals and organizations should leverage this analysis? Why does it help them?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aanenson&lt;/strong&gt;: One of the most challenging parts of being a cybersecurity leader is articulating to a non-technical leadership team why certain security investments are needed to avoid an uncertain outcome. &lt;strong&gt;This study helps close the uncertainty gap by showing clear correlations between cybersecurity performance across key Bitsight risk vectors and the likelihood of experiencing an incident&lt;/strong&gt;. This should help cybersecurity leaders and risk managers better convey this information so security budgets are optimized for the best and most tangible outcomes. Additionally, when organizations monitor how their investments have impacted their Bitsight rating over time, it will allow them to articulate a critical metric that drives budgeting decisions – return on investment.&lt;/p&gt;

&lt;p&gt;To learn more about the 14 cybersecurity analytics most correlated with incidents, please &lt;a href="https://www.bitsight.com/resources/the-marsh-mclennan-cyber-risk-analytics-center-study-finds-statistically-significant-correlation-between-bitsight-analytics-and-cybersecurity-incidents"&gt;download the report now&lt;/a&gt;.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sat, 14 Oct 2023 13:00:00 +0000</pubDate>
    <dc:creator>Eric Cisternelli</dc:creator>
    <guid isPermaLink="false">11706 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>Cyber Insurance Underwriting: What Role Do Security Ratings Play?</title>
  <link>https://www.bitsight.com/blog/cyber-insurance-underwriting-what-role-do-security-ratings-play</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;Cyber Insurance Underwriting: What Role Do Security Ratings Play?&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/1" typeof="schema:Person" property="schema:name" datatype&gt;admin_bitsight&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-10-06T16:36:39+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-10-06T12:36:39-04:00" title="Friday, October 6, 2023 - 12:36" class="datetime"&gt;Fri, 10/06/2023 - 12:36&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--3831 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;If you’re involved in the cyber insurance underwriting process—from the transaction to the ongoing operations—you’re constantly looking for things to help you (and your team) select better risks. Here are three specific ways Bitsight’s Security Ratings platform can play an integral role in the underwriting process. &lt;!--more--&gt;&lt;/p&gt;

&lt;h2&gt;Cyber Insurance Underwriting: What Role Do Security Ratings Play?&lt;/h2&gt;

&lt;h3&gt;1. Gaining Insight Into The Transaction&lt;/h3&gt;

&lt;p&gt;The first step in the cyber insurance underwriting process is the insurance application. It includes questions regarding security posture that virtually every carrier wants to learn more about. For example, if the applicant is looking for business continuity or business interruption coverage, you would focus your coverage-specific questions around disaster recovery procedures, how long it takes the applicant to get back online, business continuity management, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Ratings &lt;/strong&gt;make it easy for underwriters to map the answers to these security posture questions to risk vectors defined by Bitsight. This way, you not only have the customer’s perspective on a topic, but you also have an objective. This can help you determine if there are any deviations or gaps between what the customer says and what Security Ratings tell you—and if there is, you can dig deeper into that particular part of the application.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocklibrary"&gt;
    
    
          
&lt;div class="block-content block-content--type-library block-content--22211 block-content--view-mode-full"&gt;
  
  
  &lt;div class="block-content__content"&gt;
    
            &lt;div class="field field--name-field-block field--type-entity-reference field--label-hidden field__item"&gt;
                          






&lt;div class="block-content block-content--type-cta block-content--22121 block-content--view-mode-default"&gt;
  
  
      




  



&lt;div class="card--with-header card--media-right card--image-bottom"&gt;
  
  
  
  &lt;article class="card  "&gt;
    &lt;div class="card__inner-wrapper container "&gt;

                        &lt;div class="card__media"&gt;
            &lt;div class="card__media-screenshot"&gt;
              &lt;div class="card__circle-container"&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;div class="media-wrapper "&gt;
                              
      &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;article class="media media--type-image media--view-mode-cta"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/styles/cta/public/2023/06/13/How%20Bitsight%20Helps%20you%20get%20insurance%20coverage%20CTA.png?itok=CHSD-Mmg" width="570" height="377" alt="How Bitsight Helps you get insurance coverage" typeof="foaf:Image" class="image-style-cta"&gt;



              &lt;/div&gt;
      
  &lt;/article&gt;

                  &lt;/div&gt;
          &lt;/div&gt;
  
              
                          &lt;/div&gt;
          &lt;/div&gt;
        
              
      &lt;div class="card__content"&gt;
                
                  &lt;div class="card__heading"&gt;
            

  &lt;h2 class="heading card__title heading--white card__title--normal heading__without-link "&gt;
          How Bitsight Helps You Get Cyber Insurance Coverage
          &lt;/h2&gt;
          &lt;/div&gt;
        
        
                  &lt;div class="card__summary"&gt;
              &lt;div class="body-text"&gt;
              
            &lt;div class="clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item"&gt;
                          &lt;p&gt;The average cost of a ransomware attack is $1.85 million and 22 days to recover. If you’re looking for cyber insurance coverage to protect yourself, download our ebook to learn how to strengthen your cybersecurity program to influence coverage.&lt;/p&gt;

              &lt;/div&gt;
      
        
  &lt;/div&gt;
          &lt;/div&gt;
        
                  &lt;div class="card__cta"&gt;
                          &lt;div class="card__button"&gt;
                


  &lt;a href="https://www.bitsight.com/resources/how-bitsight-helps-you-get-cyber-insurance-coverage" class="button card__button button--filled-white" aria-label&gt;Download eBook
    
      &lt;/a&gt;
              &lt;/div&gt;
            
            
                      &lt;/div&gt;
              &lt;/div&gt;
    &lt;/div&gt;
  &lt;/article&gt;
    &lt;/div&gt;
  &lt;/div&gt;

              &lt;/div&gt;
      
  &lt;/div&gt;
&lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--8266 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;h3&gt;2. Benchmarking Against Your Portfolio For Risk Context&lt;/h3&gt;

&lt;p&gt;A major issue with applications and questionnaires is that responses are generally the same across all applicants, making it difficult to distinguish a high-risk from a lower-risk applicant.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Ratings&lt;/strong&gt; offer an objective way to benchmark applicants against your existing customers with similar attributes or demographic. For example, if a $10 million law firm headquartered in New York applies for cyber insurance through your organization, you can pull all the other organizations of a similar size and scope from your portfolio. This information will provide you the context you need to ask the applicant additional questions and price them accordingly.&lt;/p&gt;

&lt;h3&gt;3. Modeling &amp;amp; Risk Aggregation Strategy&lt;/h3&gt;

&lt;p&gt;Understanding how adding an applicant impacts vendor dependency risk across your larger portfolio is critical—and &lt;strong&gt;Security Ratings&lt;/strong&gt; can help with this.&lt;/p&gt;

&lt;p&gt;For example, if you have 100 customers using a certain DNS provider, and an applicant that also uses that provider comes to you looking for business continuity coverage, you can use Security Ratings to immediately verify that they’re also using that third-party DNS provider. If so, underwriting this applicant would mean that you’d have &lt;em&gt;101&lt;/em&gt; customers using the same DNS provider—and you’d need to determine what this meant to you. Depending on the common vendor dependency risk you’re willing to take, you may or may not offer coverage. If you do offer it, you may change the limit, ask additional questions about vendor policies, increase the applicant’s retention, or change the applicant’s waiting period. Regardless, without insight from Security Ratings, it’s far more difficult to ensure your aggregate risk levels are at a level you’re comfortable with.&lt;/p&gt;

&lt;h2&gt;In Summary&lt;/h2&gt;

&lt;p&gt;It’s clear Security Ratings make an impact in a number of critical areas for cyber insurance underwriting—and we can’t forget about how Security Ratings make an impact from an operational perspective!&lt;/p&gt;

&lt;p&gt;If you get the opportunity to write excess coverage, but you don’t know the level, Security Ratings can help steer you closer to writing the primary coverage. Bitsight also gives you this information in real time so you don’t have to wait to make a decision until an applicant finishes their questionnaire or an applicant’s broker sends you their responses.&lt;/p&gt;

&lt;p&gt;Looking for more information on how Security Ratings could impact your cyber insurance underwriting risk? &lt;a href="https://info.bitsight.com/cyber-insurance-underwriting-high-tech-discipline-webinar"&gt;Download this on-demand webinar&lt;/a&gt; to learn exactly how the underwriting process has developed over the years, hear experts discuss the current trends in the industry, and find out the latest tools carriers are adopting to better assess a corporation’s cyber preparedness.&lt;/p&gt;
&lt;!-- end HubSpot Call-to-Action Code --&gt;
              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 06 Oct 2023 16:36:39 +0000</pubDate>
    <dc:creator>admin_bitsight</dc:creator>
    <guid isPermaLink="false">3416 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>What You Are and Aren’t Responsible for Under Cyber Risk Insurance</title>
  <link>https://www.bitsight.com/blog/cyber-risk-insurance-coverage</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;What You Are and Aren’t Responsible for Under Cyber Risk Insurance&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/1" typeof="schema:Person" property="schema:name" datatype&gt;admin_bitsight&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-09-30T17:45:53+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-09-30T13:45:53-04:00" title="Saturday, September 30, 2023 - 13:45" class="datetime"&gt;Sat, 09/30/2023 - 13:45&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--1596 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;It’s not hard to justify why you need property insurance when you’re surrounded by your physical goods that you don’t want to be lost or damaged in your home or business. So why isn’t cybersecurity the same?&lt;/p&gt;

&lt;p&gt;Cyber risk insurance is often not considered until it’s too late. Imagine you’ve discovered&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="9aa1f3af-c6e3-4033-9d84-233052bcebd8" href="https://www.bitsight.com/blog/bitsight-analysis-of-solarwinds-orion-part-1-prevalence" rel="noopener" target="_blank"&gt;malicious software present on your network&lt;/a&gt;, like a ransomware attack on employee information or a&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="914850bb-8c59-4a5e-9441-1f85d9d7538f" href="https://www.bitsight.com/blog/vulnerabilities-persist-with-hafnium" rel="noopener" target="_blank"&gt;backdoor breach&lt;/a&gt;&amp;nbsp;through a third-party access point. Without cyber risk insurance, your organization is solely responsible for all of the resources and monetary needs to remediate your systems and respond to the attack.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Definitely not ideal for any organization dealing with&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="a2d07b75-a91f-4d1b-9851-d70d93eaf835" href="https://www.bitsight.com/resources/digital-risk-reduction-and-security-performance-management" rel="noopener" target="_blank"&gt;growing attack surfaces&lt;/a&gt;&amp;nbsp;and increasingly sophisticated recent hacking attempts.&lt;/p&gt;

&lt;h2&gt;What is cyber risk insurance?&lt;/h2&gt;

&lt;p&gt;Cyber risk insurance protects an organization from security &amp;amp; privacy events by covering the cost to recover from a data breach, virus, or other form of malicious cybersecurity activity. Besides aiding your organization in your own recovery,&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="1b263c08-1711-4014-8e2a-f05773c2a65f" href="https://www.bitsight.com/node/261" rel="noopener" target="_blank"&gt;cyber insurance&lt;/a&gt;&amp;nbsp;is also important to support and defend your organization from legal liability from those affected by the breach. This could potentially come from customers, employees, partners, third parties, and anyone connected to your network who is affected and potentially had their data exposed.&lt;/p&gt;

&lt;h2&gt;Coverage Explained&lt;/h2&gt;

&lt;p&gt;It’s important to match your expectations with reality when deciding on cyber insurance for your organization. Where are the&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="c0b13967-b67a-4740-bb96-4af6174c742c" href="https://www.bitsight.com/node/361" rel="noopener" target="_blank"&gt;risks most prominent on your network&lt;/a&gt;, and who could be impacted by a breach?&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--6031 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;In short, every organization is vulnerable to a cyber incident, and even if the data you store on your network isn’t particularly desirable to hackers, it is likely that sensitive data may reside with your&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="5665f9cb-75fb-4d29-8d94-d69875d6ce00" href="https://www.bitsight.com/node/6641" rel="noopener" target="_blank"&gt;third party providers&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Like other insurance coverages, cyber risk insurance covers a common set of scenarios, but there are situations where an organization can still be exposed. Most insurers offer similar coverage options, however a few offer less-common ones. Here is a breakdown of what is covered, and not covered, with cyber risk insurance:&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;When you can expect coverage&lt;/strong&gt;&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Data breach or Distributed Denial of Service (DDOS) attack that brings down your network&lt;/li&gt;
	&lt;li&gt;Malware infection that spreads through devices connected to your network, making it impossible to operate&lt;/li&gt;
	&lt;li&gt;Extortion demands made by bad actors holding sensitive information they are threatening to expose&lt;/li&gt;
	&lt;li&gt;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="87180101-f335-4acc-9fff-7d5a870ffb6e" href="https://www.bitsight.com/blog/what-is-ransomware-types-and-examples" rel="noopener" target="_blank"&gt;Ransomware&lt;/a&gt;&amp;nbsp;demands that lock up devices and threaten to leak sensitive data&lt;/li&gt;
	&lt;li&gt;Business-email compromise resulting in sharing sensitive information&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Liabilities associated with contractual obligations, including within the payment card industry (&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="524a6901-40b1-4eec-9d6d-80f6605d6488" href="https://www.bitsight.com/blog/are-your-payment-card-vendors-maintaining-pci-security-standards" rel="noopener" target="_blank"&gt;PCI&lt;/a&gt;) Fines &amp;amp; Penalties&lt;/li&gt;
	&lt;li&gt;Defending against class-action lawsuits and paying settlements&lt;/li&gt;
	&lt;li&gt;Legal expenses, fines, and penalties associated with regulatory investigations&lt;/li&gt;
	&lt;li&gt;Lost business profits, accrued expenses, and extra costs while actively experiencing a cyber incident, either due to malicious hack or human error&lt;/li&gt;
	&lt;li&gt;Media liability associated with infringement and other content that is electronically disseminated&lt;/li&gt;
	&lt;li&gt;Losses due to social engineering fraud tricking you or your employees into sending funds you shouldn’t have&lt;/li&gt;
	&lt;li&gt;The business profit lost due to reputational damage to your brand soon following a publicized cyber attack&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For many of the scenarios above, these can also be triggered by trusted third-party vendors whom you are sharing data with and/or rely on for critical business operations.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;When you aren’t covered&lt;/strong&gt;&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;When physical company property is damaged or destroyed, even if it holds&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="0cb27935-7420-42a9-ae92-9f190efeebfa" href="https://www.bitsight.com/blog/sensitive-data-examples-how-to-protect-it" rel="noopener" target="_blank"&gt;sensitive data&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The lost value to an organization due to theft of intellectual property&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The loss of potential future company profits&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Beyond covering first and third-party costs associated with the above scenarios, cyber insurers also offer customers a vetted list of providers they can work with. These providers can be: pre-breach - like&amp;nbsp;Bitsight&amp;nbsp;- to help organizations better understand their security posture and prepare themselves to be more resilient to a cyber event; post-breach providers like a legal firm who acts as a “breach coach” helping clients navigate through an event; forensic service providers, public relations companies, and more. You should try to align yourself with an insurer that has both a comprehensive set of coverages they provide and also a panel of expert vendors you can work with to prepare, prevent and protect yourself from a cyber event.&lt;/p&gt;

&lt;p&gt;Like other types of insurance, cyber risk insurance often requires organizations to prove they are taking some sort of action to protect their network against threat actors. If an organization doesn’t protect their network at all, they might not be approved for insurance, or be charged a high rate, similar to how if someone has a riskier health behavior like smoking they might be given a higher health-insurance monthly cost.&lt;/p&gt;

&lt;p&gt;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="c52efa95-2df1-49fd-bc4c-8bc2f7c9c8c1" href="https://www.bitsight.com/security-ratings" rel="noopener" target="_blank"&gt;Bitsight Security Ratings&lt;/a&gt;&amp;nbsp;are a great way to prove your cybersecurity protection efforts to a cyber risk insurance provider. Presenting&amp;nbsp;an objective view&amp;nbsp;of your network’s&amp;nbsp;cybersecurity posture&amp;nbsp;will give your potential insurance provider a trusted view into what your organization does to protect from threats, and will make securing a cyber risk insurance policy smoother.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Real examples happening around us&lt;/h2&gt;

&lt;p&gt;There are countless real-world cyber incident examples where organizations have suffered financial, reputational, and operational losses due to a seemingly small vulnerability. Just look at the recent&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="2ade28a8-1b42-4961-b00d-c81c06394ffa" href="https://www.bitsight.com/blog/bitsight-observations-into-hafnium-part-four-who-is-still-vulnerable" rel="noopener" target="_blank"&gt;Microsoft Exchange Hafnium&lt;/a&gt;&amp;nbsp;breach that affected thousands of organizations around the world.&lt;/p&gt;

&lt;p&gt;Organizations trusting their sensitive email conversations and contact information stored in the Exchange servers were left scrambling to update their devices and patch their systems from a vulnerability that occurred on a seemingly cybersecurity-focused corporation like Microsoft.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You can’t ignore the possibility of a compromise to your network any longer. With large, well-funded, global organizations being targeted by malicious actors, it is less of a “if” a cyber incident will occur and more shifting to a “when”. Organizations&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="5379f328-0589-45e6-acef-042a5bed642d" href="https://www.bitsight.com/blog/better-cloud-security-posture-management" rel="noopener" target="_blank"&gt;rely on cloud management services&lt;/a&gt;&amp;nbsp;to facilitate company operations and stay competitive in their industry. Preventing attacks to your network is now becoming just as vital to organization success, as well as not letting an attack completely drain your organization’s funds.&lt;/p&gt;

&lt;h2&gt;Insurance that you can trust&lt;/h2&gt;

&lt;p&gt;Even if you have a mature, established security management system, your network is subject to the performance of&amp;nbsp;your vendors’ cybersecurity management practices&amp;nbsp;as well. Gaining full visibility in the threats on your network, including your vendor risk landscape, will help prepare you for the level of cyber risk insurance you need. Accurate data on your vendor risks can also help you stay informed if your vendors are meeting their cybersecurity requirements potentially listed out in&amp;nbsp;&lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="ea890b23-6b60-4092-a208-ac0a0aa07d6a" href="https://www.bitsight.com/blog/vendor-contract-dos-and-donts" rel="noopener" target="_blank"&gt;your contract&lt;/a&gt;, or in a recent audit.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Bitsight Security Ratings&amp;nbsp;provide an external view of the risks to your network, as well as third parties and partners with integrated systems. Utilizing security ratings to get a&amp;nbsp;complete view of your network&amp;nbsp;now can help reduce potential cyber risk insurance claims in the future.&lt;/p&gt;
              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocklibrary"&gt;
    
    
          
&lt;div class="block-content block-content--type-library block-content--22181 block-content--view-mode-full"&gt;
  
  
  &lt;div class="block-content__content"&gt;
    
            &lt;div class="field field--name-field-block field--type-entity-reference field--label-hidden field__item"&gt;
                          






&lt;div class="block-content block-content--type-cta block-content--22121 block-content--view-mode-default"&gt;
  
  
      




  



&lt;div class="card--with-header card--media-right card--image-bottom"&gt;
  
  
  
  &lt;article class="card  "&gt;
    &lt;div class="card__inner-wrapper container "&gt;

                        &lt;div class="card__media"&gt;
            &lt;div class="card__media-screenshot"&gt;
              &lt;div class="card__circle-container"&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
                &lt;span class="card__circle"&gt;&lt;/span&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;div class="media-wrapper "&gt;
                              
      &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;article class="media media--type-image media--view-mode-cta"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/styles/cta/public/2023/06/13/How%20Bitsight%20Helps%20you%20get%20insurance%20coverage%20CTA.png?itok=CHSD-Mmg" width="570" height="377" alt="How Bitsight Helps you get insurance coverage" typeof="foaf:Image" class="image-style-cta"&gt;



              &lt;/div&gt;
      
  &lt;/article&gt;

                  &lt;/div&gt;
          &lt;/div&gt;
  
              
                          &lt;/div&gt;
          &lt;/div&gt;
        
              
      &lt;div class="card__content"&gt;
                
                  &lt;div class="card__heading"&gt;
            

  &lt;h2 class="heading card__title heading--white card__title--normal heading__without-link "&gt;
          How Bitsight Helps You Get Cyber Insurance Coverage
          &lt;/h2&gt;
          &lt;/div&gt;
        
        
                  &lt;div class="card__summary"&gt;
              &lt;div class="body-text"&gt;
              
            &lt;div class="clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item"&gt;
                          &lt;p&gt;The average cost of a ransomware attack is $1.85 million and 22 days to recover. If you’re looking for cyber insurance coverage to protect yourself, download our ebook to learn how to strengthen your cybersecurity program to influence coverage.&lt;/p&gt;

              &lt;/div&gt;
      
        
  &lt;/div&gt;
          &lt;/div&gt;
        
                  &lt;div class="card__cta"&gt;
                          &lt;div class="card__button"&gt;
                


  &lt;a href="https://www.bitsight.com/resources/how-bitsight-helps-you-get-cyber-insurance-coverage" class="button card__button button--filled-white" aria-label&gt;Download eBook
    
      &lt;/a&gt;
              &lt;/div&gt;
            
            
                      &lt;/div&gt;
              &lt;/div&gt;
    &lt;/div&gt;
  &lt;/article&gt;
    &lt;/div&gt;
  &lt;/div&gt;

              &lt;/div&gt;
      
  &lt;/div&gt;
&lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocklibrary"&gt;
    
    
          
&lt;div class="block-content block-content--type-library block-content--14781 block-content--view-mode-full"&gt;
  
  
  &lt;div class="block-content__content"&gt;
    
  &lt;/div&gt;
&lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sat, 30 Sep 2023 17:45:53 +0000</pubDate>
    <dc:creator>admin_bitsight</dc:creator>
    <guid isPermaLink="false">1276 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>Underwriting Cyber Risk Part 2: Metrics to Track Cyber Hygiene</title>
  <link>https://www.bitsight.com/blog/underwriting-cyber-risk-part-2-metrics-track-cyber-hygiene</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;Underwriting Cyber Risk Part 2: Metrics to Track Cyber Hygiene&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/71" typeof="schema:Person" property="schema:name" datatype content="rachel.holmes@bitsight.com"&gt;rachel.holmes@…&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-09-23T12:30:00+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-09-23T08:30:00-04:00" title="Saturday, September 23, 2023 - 08:30" class="datetime"&gt;Sat, 09/23/2023 - 08:30&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--25466 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Cyber insurers regularly get requests for new business and increased limits. How can they determine which organizations will be a risk worth taking? In my previous blog, I discussed how understanding an applicant’s cyber hygiene is the best indicator of whether they may experience a successful ransomware or other cyber attack. In this blog, I’ll walk through how to measure an applicant's &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f7e108d3-f042-4faa-a732-333c12b6019a" href="https://www.bitsight.com/glossary/cyber-hygiene"&gt;cyber hygiene&lt;/a&gt; and which metrics are categorically proven to stand out.&lt;/p&gt;

&lt;h2&gt;How to measure an applicant's cyber hygiene&lt;/h2&gt;

&lt;p&gt;Despite the significant increase in cyber insurance premiums, there are still organizations that lean on their cyber policy in lieu of making larger investments in new and more effective security controls. Part of an underwriter’s job is to identify these cases and avoid insuring them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A strong candidate for cyber insurance is typically an organization that performs the following tasks and then seeks insurance for risks that are unlikely to materialize (yet would be devastating if they did):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Demonstrates that they have processes in place to identify cyber risk&lt;/li&gt;
	&lt;li&gt;Mitigates high likelihood and high impact risks sufficiently&lt;/li&gt;
	&lt;li&gt;Integrates backup controls and other layers of security to enforce a defense-in-depth strategy&lt;/li&gt;
	&lt;li&gt;Monitors their security program for effectiveness&lt;/li&gt;
	&lt;li&gt;Seeks incremental improvements over time&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Armed with this information, underwriters can perform a more in-depth discovery with applicants so that the risk is qualitatively and quantitatively evaluated against specific underwriting criteria. The most common quantitative method to measure cyber hygiene is with a &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="f40c414f-4be8-4416-97b4-0a2bbe126b17" href="https://www.bitsight.com/glossary/cybersecurity-ratings"&gt;cybersecurity ratings&lt;/a&gt; tool. Modern IT environments are complex, and it’s hard to make and understand insureds’ claims about cybersecurity. Cybersecurity ratings solutions help underwriters verify the accuracy of the information they receive from applicants with an unbiased view of a cybersecurity program.&lt;/p&gt;

&lt;h2&gt;Start with an applicant's security rating&lt;/h2&gt;

&lt;p&gt;The best indicator for future performance is past performance. Underwriters can derive this from cybersecurity ratings because they are based on historical cybersecurity performance. Think of a &lt;a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="061a65a4-b128-4947-a0d5-9b068f91cd56" href="https://www.bitsight.com/blog/what-is-a-security-rating"&gt;security rating&lt;/a&gt; like a credit rating—if someone missed a payment by the due date, their credit score might be impacted and then need time to recover. When it comes to cyber insurance, the same principles apply so that applicants are incentivized to maintain strong cybersecurity throughout the policy period. Without that incentive, some insureds might treat cybersecurity as a once-a-year exercise, leaving insureds vulnerable throughout the policy period and their carriers on the hook for claims.&amp;nbsp;&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--25471 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;h2&gt;Key metrics that highlight cyber hygiene&lt;/h2&gt;

&lt;p&gt;Aside from a quantitative cybersecurity rating, other findings may correlate to the likelihood of an applicant experiencing a cybersecurity incident. For example, expired certificates may not seem like a significant risk, but certificate management is a simple, routine IT task for most organizations. Therefore, a history of expired certificates demonstrates low cyber maturity overall. From that, an underwriter can infer that other, more critical cybersecurity practices are lacking too. And that means that cyber criminals may have more opportunities to identify and exploit vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;More importantly though, certain analytics are statistically correlated to the likelihood of experiencing a cybersecurity incident. A &lt;a href="https://www.bitsight.com/blog/new-study-finds-significant-correlation-between-bitsight-analytics-and-cybersecurity-incidents"&gt;new, independent study&lt;/a&gt; by the world’s largest insurance broker, Marsh McLennan, found 14 Bitsight analytics to be significantly correlated with cybersecurity incidents. Looking at some of the key metrics in this study—such as patching cadence and the Bitsight Security Rating—enables underwriters to easily synthesize the significant amount of risk data they analyze when they underwrite accounts. You can &lt;a href="https://www.bitsight.com/blog/these-14-cybersecurity-analytics-can-help-you-make-better-cyber-insurance-decisions"&gt;read my interview&lt;/a&gt; to learn more about how this study impacts the cyber insurance industry.&lt;/p&gt;

&lt;p&gt;No organization is immune from determined cyber criminals, just like how no homeowner can ever be immune to severe weather damage to their home. But, there are best practices for minimizing the likelihood of being victimized, chief among them being a relentless focus on cyber hygiene—the practice of ensuring that the organization is performing effectively every day. When an insurer identifies poor hygiene in one area, no matter how small it may seem, it almost certainly means that the organization lacks adequate controls in other areas as well. It’s not about looking at cyber controls on their own. It’s about looking at what they infer about an insured’s cyber maturity.&lt;/p&gt;

&lt;h2&gt;The carrier's role in risk control&lt;/h2&gt;

&lt;p&gt;As insurance carriers continue to develop methods to limit risks that drive loss ratios to uncomfortable levels, it’s important to look within. Carriers have an opportunity to support their insureds to limit losses through the policy period. Because cyber insurance is now a business requirement for so many, some small-to-medium businesses simply struggle to create and maintain security programs that meet strict underwriting requirements.&lt;/p&gt;

&lt;p&gt;To help, some carriers may pay outside firms for mentoring services. In other cases, carriers and managing general agents (MGAs) use cyber ratings tools to monitor their insureds for vulnerabilities, and they may even provide remediation support. Lowering the carrier’s cyber loss ratio by even a single digit can be well worth the investment for these loss control services.&lt;/p&gt;

&lt;p&gt;For example, &lt;a href="https://www.bitsight.com/bitsight-professional-services"&gt;Bitsight advisors work with insureds&lt;/a&gt; to help them understand reactive and proactive opportunities to improve their risk profiles. In addition, by collaborating with insureds, the advisors help insureds create self-published ratings that reflect the distinctions between various segmented networks (such as guest networks). Through this service, Bitsight creates plans for insureds to remediate weaknesses that can help them avoid cyber attacks, as well as provide a high-level comprehensive review of the Bitsight solution as it relates to features and capabilities.&amp;nbsp;The study from Marsh McLennan found that organizations that have a lower Bitsight rating has a higher likelihood of cybersecurity incidents by as much as 4.8 times. By working with Bitsight advisors, organizations can improve their cyber hygiene and therefore reduce their risk.&lt;/p&gt;

&lt;h2&gt;Providing valuable cyber insurance policies&lt;/h2&gt;

&lt;p&gt;Cyber attacks and ransomware will only continue to ravage companies worldwide. The cyber insurance industry needs a strategy to quickly respond to this risk landscape, and provide valuable cyber policies that protect against risks to stay viable in an increasingly high-tech, connected landscape. Combining these insights with the way that end-users are leveraging cybersecurity products to support their cyber hygiene workflows, insurance carriers can provide more risk mitigation services alongside the cyber ratings tools they use to underwrite accounts.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Sat, 23 Sep 2023 12:30:00 +0000</pubDate>
    <dc:creator>rachel.holmes@bitsight.com</dc:creator>
    <guid isPermaLink="false">12426 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>Underwriting Cyber Risk Part 1: Focus on Cyber Hygiene</title>
  <link>https://www.bitsight.com/blog/underwriting-cyber-risk-part-1-focus-cyber-hygiene-0</link>
  <description>&lt;span property="schema:name" class="field field--name-title field--type-string field--label-hidden"&gt;Underwriting Cyber Risk Part 1: Focus on Cyber Hygiene&lt;/span&gt;
&lt;span rel="schema:author" class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/71" typeof="schema:Person" property="schema:name" datatype content="rachel.holmes@bitsight.com"&gt;rachel.holmes@…&lt;/span&gt;&lt;/span&gt;
&lt;span property="schema:dateCreated" content="2023-09-20T12:30:00+00:00" class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-09-20T08:30:00-04:00" title="Wednesday, September 20, 2023 - 08:30" class="datetime"&gt;Wed, 09/20/2023 - 08:30&lt;/time&gt;
&lt;/span&gt;

    &lt;div class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
        &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--25456 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Cyber risk uncertainty is growing. Despite massive spending worldwide to the tune of &lt;a href="https://www.gartner.com/en/documents/4016190"&gt;$173 billion&lt;/a&gt;, cyber attacks keep occurring. Ransomware attacks—a type of cyberattack that encrypts an organization's network or locks users out of their devices and requires a ransom before restoring access—are costing companies &lt;a href="https://www.statista.com/statistics/1275029/length-of-downtime-after-ransomware-attack/"&gt;20 days of downtime&lt;/a&gt; on average. Within the next few years, &lt;a href="https://www.gartner.com/en/articles/7-top-trends-in-cybersecurity-for-2022"&gt;nearly half of companies&lt;/a&gt; worldwide will experience cyber attacks on their software supply chains. And threats like malware and botnets (&lt;a href="https://www.bitsight.com/blog/emotet-botnet-rises-again"&gt;such as the recent Emotet re-emergence&lt;/a&gt;) are wreaking havoc on companies worldwide.&lt;/p&gt;

&lt;p&gt;It comes as no surprise that cyber insurance claims are exploding. As companies worldwide scramble for coverage, insurers are experiencing significant losses and rethinking their underwriting decisions. The result? Stricter underwriting standards, which take longer to evaluate.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So how do cyber insurers determine which organizations are going to be a risk worth taking? It depends on an organization’s overall cyber hygiene and their ability to effectively respond to new attacks and vulnerabilities. It’s more important than ever to continue underwriting good and opportunistic risks, while not overcorrecting for the high loss ratios the industry is seeing. Insureds need to answer two questions: what is good cyber hygiene and how do you measure it? In this blog, I will tackle the first of these questions. Insurers have to first understand the current cyber insurance landscape and how it impacts cyber hygiene.&lt;/p&gt;

&lt;h2&gt;The link between ransomware and cyber insurance&lt;/h2&gt;

&lt;p&gt;Before unpacking cyber hygiene, first consider how ransomware is impacting the cyber insurance landscape. Traditional insurance, such as auto or home insurance, provides coverage for high impact, low frequency events. This type of insurance covers events that likely won’t happen, but could be very costly if they did. Organizations seek insurance coverage for these risks because it’s impractical to mitigate or avoid them. With the explosion of ransomware, companies suddenly experience high impact and high frequency incidents—making cyber insurance more expensive and harder to get, yet more necessary than ever.&lt;/p&gt;

&lt;p&gt;Ransomware has been a threat for a long time. In 2016, &lt;a href="https://www.bitsight.com/blog/rising-face-of-cybercrime-ransomware"&gt;Bitsight published an article&lt;/a&gt; to draw attention to the problem. Since then, ransomware and other similar threats are only continuing to explode. Nowadays, attackers use cryptocurrencies to monetize ransomware attacks in a way that’s easier to get payment and avoid tracking. Plus, the rapid speed of digital transformation in the last few years means that the attack surface has never been bigger for attackers to find areas of weakness.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;
  &lt;div class="block block-layout-builder block-inline-blocktext"&gt;
    
    
          


  

&lt;div class="block-content block-content--type-text block-content--25461 block-content--view-mode-full container text-wysiwyg"&gt;

  
  

          &lt;div class="text-wysiwyg__title"&gt;
      

    &lt;/div&gt;
  
      &lt;div class="text-wysiwyg__body"&gt;
      
            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;What does this mean for cyber insurance carriers? They need to maintain the right balance of risk by offering valuable policies that pay claims when covered losses occur, while being careful not to encourage risky behavior with overly broad policy coverage. The underwriter has to determine which organizations are doing enough to prevent frequent claims to be eligible for the specific coverage they offer.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most notably, frequent ransomware claims drive a lot of the chaos in the cyber insurance market. Ransomware usually exploits common, known vulnerabilities in insecure services and software. But a strong cybersecurity program will be able to &lt;a href="https://www.bitsight.com/blog/what-is-vulnerability-management"&gt;manage vulnerabilities&lt;/a&gt;, protect endpoints, and monitor the effectiveness of security controls so that they can be improved over time. From an insurer’s perspective, knowing if a company can effectively perform these functions is a good way to start understanding their cyber hygiene.&lt;/p&gt;

&lt;h2&gt;What is (good) cyber hygiene?&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.bitsight.com/glossary/cyber-hygiene"&gt;Cyber hygiene&lt;/a&gt; is a set of essential practices and tasks a company uses to keep systems, data, and users secure. Strong cyber hygiene enhances overall cybersecurity through activities like regular assessments, improvements, patching, control implementation, and secure configuration. Regular processes like these give companies insight to determine if their security controls work effectively and ways to improve them over time. Good cyber hygiene significantly lowers the chance of ransomware and other cyber attacks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Effective cyber hygiene begins with an understanding of best practices for improving security and reducing risk, such as those identified in the &lt;a href="https://www.nist.gov/cyberframework"&gt;NIST Cybersecurity Framework&lt;/a&gt; or other cybersecurity standard or framework. By mapping existing security practices to a framework, security teams can evaluate their current level of cyber hygiene and take steps to improve it. Organizations should continuously monitor their efforts on each of these tasks and alert security teams to lapses in best practices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, underwriters should focus on the concept of cyber maturity, not just cyber controls, so that security information can be inferred quickly when underwriting particularly complex organizations. For example, asking an organization to explain their process for identifying and remediating new vulnerabilities provides a slew of insights, and gives the underwriter a sense of how they would handle &lt;a href="https://www.bitsight.com/blog/what-is-a-zero-day-third-party-risk-management"&gt;zero-day vulnerabilities&lt;/a&gt;. Asking intelligent questions during the insurance application process guides the understanding of a company’s cyber maturity, and in turn, their cyber hygiene.&lt;/p&gt;

&lt;h2&gt;Cyber hygiene proves to insurers that an applicant is invested in cybersecurity&lt;/h2&gt;

&lt;p&gt;The likelihood of an applicant experiencing a successful ransomware attack begins with understanding their cyber hygiene. And the best applicants know that good cyber hygiene proves to cyber insurers that they are actively invested in their security posture, which makes them better risks to write. Now that we’ve established a baseline for why cyber hygiene is important, the next blog in this series will cover how an insurer can tell whether an organization has good cyber hygiene and which metrics to monitor.&lt;/p&gt;

              &lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

      &lt;/div&gt;

    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Wed, 20 Sep 2023 12:30:00 +0000</pubDate>
    <dc:creator>rachel.holmes@bitsight.com</dc:creator>
    <guid isPermaLink="false">12421 at https://www.bitsight.com</guid>
    </item>
<item>
  <title>Bitsight Cyber Insurance Policyholder Detection &amp; Response</title>
  <link>https://www.bitsight.com/resources/bitsight-cyber-insurance-policyholder-detection-response</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Bitsight Cyber Insurance Policyholder Detection &amp;amp; Response&lt;/span&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang about="https://www.bitsight.com/user/16" typeof="schema:Person" property="schema:name" datatype&gt;Eric Cisternelli&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;&lt;time datetime="2023-07-17T10:24:55-04:00" title="Monday, July 17, 2023 - 10:24" class="datetime"&gt;Mon, 07/17/2023 - 10:24&lt;/time&gt;
&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;
                          &lt;p&gt;Bitsight Cyber Insurance Policyholder Vulnerability Detection &amp;amp; Response empowers organizations to take action on high-priority incidents at a moment’s notice. Teams rely on these capabilities to initiate outreach to policyholders and track responses to critical vulnerabilities through scalable templated questionnaires—with tailored exposure evidence—for more effective remediation and to leverage industry-leading data to prioritize mitigation efforts.&lt;/p&gt;

&lt;p&gt;Download our datasheet to learn how Policyholder Vulnerability Detection &amp;amp; Response enables you to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Quickly access comprehensive views of vulnerabilities across your portfolio&lt;/li&gt;
	&lt;li&gt;Prioritize, scale, and track policyholder outreach with built-in questionnaires and workflows through the Bitsight Cyber Insurance application&lt;/li&gt;
	&lt;li&gt;Provide insureds with exposure evidence and action plans to remediate risk to their organization—and your portfolio&lt;/li&gt;
	&lt;li&gt;Mitigate potential claims and losses to the policyholders across your portfolio&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Download the free data sheet&lt;/strong&gt;&lt;/p&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-thumbnail field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;article class="media media--type-image media--view-mode-original"&gt;
  
      
            &lt;div class="field field--name-field-image field--type-image field--label-hidden field__item"&gt;
                            &lt;img loading="lazy" src="https://www.bitsight.com/sites/default/files/2023/07/17/Bitsight%20Cyber%20Insurance%20Policyholder%20Detection%20and%20Response%20Cover.png" width="750" height="496" alt="Bitsight Cyber Insurance Policyholder Detection and Response Cover" typeof="foaf:Image"&gt;


              &lt;/div&gt;
      
  &lt;/article&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-gated field--type-boolean field--label-hidden field__item"&gt;
                          Off
              &lt;/div&gt;
      
            &lt;div class="field field--name-field-media field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;article class="media media--type-document media--view-mode-default"&gt;
  
      
  &lt;div class="field field--name-field-media-file field--type-file field--label-visually_hidden"&gt;
    &lt;div class="field__label visually-hidden"&gt;File&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://www.bitsight.com/sites/default/files/2023-07/Cyber%20Insurance%20Vulnerability%20Detection.pdf" type="application/pdf"&gt;Cyber Insurance Vulnerability Detection.pdf&lt;/a&gt;&lt;/span&gt;

              &lt;/div&gt;
          &lt;/div&gt;

  &lt;/article&gt;

              &lt;/div&gt;
      
            &lt;div class="field field--name-field-resource-type field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;a href="https://www.bitsight.com/taxonomy/term/266" hreflang="en"&gt;Data Sheets&lt;/a&gt;
              &lt;/div&gt;
      
      &lt;div class="field field--name-field-topics field--type-entity-reference field--label-hidden field__items"&gt;
              &lt;div class="field__item clearfix"&gt;
                                &lt;a href="https://www.bitsight.com/taxonomy/term/101" hreflang="en"&gt;Cyber Insurance&lt;/a&gt;
                  &lt;/div&gt;
          &lt;/div&gt;
  
            &lt;div class="field field--name-field-embed field--type-entity-reference field--label-hidden field__item"&gt;
                          &lt;div class="background-color--"&gt;
      &lt;div class="container"&gt;
      

    &lt;/div&gt;  
    &lt;div class="block-content block-content--type-embed block-content--25656 block-content--view-mode-default block-content--embed-container"&gt;
    
    
          
      &lt;/div&gt;
&lt;/div&gt;

              &lt;/div&gt;
      
  &lt;div class="field field--name-field-hide-resource-from-lists field--type-boolean field--label-above"&gt;
    &lt;div class="field__label"&gt;Hide Resource from Lists?&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          Off
              &lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-button-text field--type-string field--label-above"&gt;
    &lt;div class="field__label"&gt;Button Text&lt;/div&gt;
    
              &lt;div class="field__item"&gt;
                          Download Now
              &lt;/div&gt;
          &lt;/div&gt;
</description>
  <pubDate>Mon, 17 Jul 2023 14:24:55 +0000</pubDate>
    <dc:creator>Eric Cisternelli</dc:creator>
    <guid isPermaLink="false">12486 at https://www.bitsight.com</guid>
    </item>

  </channel>
</rss>
