Next-Generation Risk Assessment: Cyber and Beyond

Create a vendor selection project
Click to express your interest in this report
Indication of coverage against your requirements
A subscription is required to activate this feature. Contact us for more info.
Celent have reviewed this profile and believe it to be accurate.
We are waiting for the vendor to publish their solution profile. Contact us or request the RFX.
Projects allow you to export Registered Vendor details and survey responses for analysis outside of Marsh CND. Please refer to the Marsh CND User Guide for detailed instructions.
Download Registered Vendor Survey responses as PDF
Contact vendor directly with specific questions (ie. pricing, capacity, etc)
28 November 2018

Cyber fits the classic insurance model by addressing mostly familiar types of losses, with a mix of established and novel coverages, made more likely with hazards insurers have never had to understand.

Key research questions

  • How does cyber fit the classic insurance model?
  • How do cyber risk assessment solutions work?
  • Could cyber solutions assess other types of risks and coverages?


To be successful, an insurer has to correctly estimate the probability of losses. To do that, the insurer collects information about risks and other factors, whose presence increases the probability of losses. For a very long time, the collection of such information has been done manually.

However, things are changing. Insurers are using new technologies which automate the assessment of risks and sharpen loss probability estimates.

These new types of hazards prominently include bad actors who, acting with intent, try to inflict losses on organizations and individuals.

Cyber losses fall into three categories: affirmative, silent, and direct. Examples of affirmative coverages, endorsements, and breach response services are provided for three leading cyber insurers.