Back to Blog

Cyber Insurance

By Finosec

January 13, 2022

Get notified on new insights from Finosec now!

Be the first to know about new Finosec blogs to grow your knowledge of the cybersecurity governance industry today!

In the ever evolving landscape of cyber risk, cyber insurance is more important than ever. This is a policy that is specifically tailored to the cybersecurity and information security needs of your institution, potentially covering incidents such as ransomware, cyber extortion, data destruction, and more. To engage with insurers and take out such a policy, the broker will be asking for information around how you secure your institution, including your user access practices and how you are managing to least privilege. CEO and Founder Zach Duke spends a few minutes sharing the cautionary tale of the National Bank of Blacksburg as well as some things to consider when working to secure this type of insurance. Watch the video then read on for further discussion.

The question Zach asks is an important one: how is the cyber insurance broker going to validate your cybersecurity posture when drafting your policy, with your user access reporting being one example? While there are some boilerplate questions and requirements, how can they determine the more specific and nuanced elements of your information security practices? This question becomes particularly potent if we act like it is a matter of “when” but not “if” we are compromised, and find ourselves needing to send this proof to the insurance broker following an incident. For example, managing to least privilege is a given in most cybersecurity policies, but that may or may not be carried out to its full effectiveness in practice. Will the user access reporting processes you have in place today be able to validate that you are managing to least privilege? If you aren’t sure or if you would like some more information, our Finosec team is ready to talk with you and discuss solutions. To schedule a meeting, click here.

Also, if you would like to watch more of these videos as well as interact with a community of others in your industry, please join Finosec Academy today! 

More from Finosec

Mastering Access Management: Best Practices for Effective User Access Reviews

Mastering Access Management: Best Practices for Effective User Access Reviews

Access management is a critical component of cybersecurity and compliance, especially for financial institutions where security expectations are paramount. The challenges surrounding permissions management, particularly during user access reviews, are increasing due to regulatory expectations and the complexity of banking applications. In this blog post, we’ll explore the regulatory expectations, common exam findings, and best practices that can help your organization manage user access effectively while adhering to the principle of least privilege – limiting user access to only the resources necessary to perform their job functions.

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

The Critical Link Between Third-Party Risk Management (TPRM) and Access Management

As highlighted in a recent article from the Federal Reserve, managing third-party relationships and the access associated with those relationships is a critical component of Third-Party Risk Management (TPRM). The associated access third party vendors have to banking systems is known as Access Management and is foundational for mitigating risks associated with third-party relationships. Access Management may be easy to overlook because it does not always reside with the same person or team as TPRM; making it difficult to provide critical oversight.

With increased regulatory focus, how should institutions be thinking of Access Management? Here are five steps your institution can take today to strengthen your third-party governance.

The Critical Foundation of Managing Access to Banking Systems

The Critical Foundation of Managing Access to Banking Systems

Managing access to banking systems has become increasingly complex as financial institutions navigate legacy reporting systems, API access, and cloud solutions. These challenges, along with the risks posed by unmanaged systems, emphasize the need for maintaining a...

Talk To An Expert Now
Talk To An Expert Now 770.268.2765