third-party cyber risk management
Threatonomics

Rewriting the Rules of Cyber Security Risks: Part II

Strengthen your cyber defenses for enhanced digital resilience.

by Erica Leise , Senior Security Solutions Engineer
Published

Building Cyber Resilience requires a new approach to assessing, measuring, and managing risk. Traditional thinking from both the security and insurance sectors views risk management in binary silos that either stop an attack or fail to prevent loss. However, the truth is that cyber security risk is significantly more complex. Being resilient to cyber security risk means balancing investments to minimize an organization’s material ability to deliver value to its clients.

This new way of thinking about cyber security risk requires organizations to connect their internal operating silos that run security, oversee finance, and manage risk transfer. Working with clients over the years, Resilience has collected these five new rules to share.

Improve Coverage by Combining Risk Insight with a Solid Cyber Hygiene Plan

More visibility into a risk profile often inspires fear of uncovering non-threatening vulnerabilities, which can negatively impact your coverage. At Resilience, our underwriting team uses our advanced security visibility to help your organization qualify for policy improvements. We work with our clients to establish actionable cyber hygiene measures to implement that will improve the security of targeted areas.

A client experienced a public cybersecurity incident. Due to the nature of the industry and the event’s impact, the client’s current insurer could no longer support their risk transfer needs.

Resilience’s security team worked alongside the client’s in-house security and IT teams to provide a vCISO engagement providing security consulting on strategy, vendor management, technical implementation, risk, and compliance. The Resilience security team ultimately helped this organization recover its insurability through targeted improvements in its security infrastructure.

Lack of Cyber History Should Not Limit Your Risk Transfer Opportunities

Organizations that lack cyber history are often perceived as having a history of incidents. Without data to base risk decisions, these organizations are left building their cyber security risk management foundation at a disadvantage, overpaying for limited coverage. At Resilience, we understand that organizations need somewhere to start. Our underwriting team reviews files based on cyber hygiene, not cyber history.

A new client entered high-growth mode and began thinking more about what cyber security risk means to their organization. Our security team realized they had all the right ideas and needed guidance. The client was willing to work closely with the Resilience security operations team to implement an actionable cyber hygiene plan to help them achieve their security goals. The client successfully implemented security controls necessary for reasonable coverage, ransomware protection, and high sub-limits at renewal.

Consider Your Cyber Risk to be as Extensive as Your Vendor’s Attack Surface

When determining risk, external and third-party risk is often overlooked or considered beyond the organization’s control. This mindset is incorrect and inefficient. At Resilience, we have established data and analysis-based strategies to manage third-party risk with the same visibility and control as internal risk.

A client’s engagement with multiple third-party vendors led to a large external attack surface. During their policy, they experienced two cyber incidents through third parties. The client engaged Resilience’s cyber security risk solution to access our security and risk modeling experts to resolve the incidents and improve their coverage through a stronger security posture. Our comprehensive cyber hygiene plan helped them resolve both incidents without impacting their ability to deliver value. By improving their cyber security risk, they could unlock lower retention rates and higher ransomware sub-limits at renewal.

Integrating Insurance and Security to Amplify Their Collective Benefits

When security and insurance operate independently, they focus on separate goals. Insurance aims to keep potential financial losses within your organization and your insurer’s tolerance. Security aims to protect and defend the infrastructure against any potential threat. The collective goal should be building Cyber Resilience, meaning finance and security will share, align, and prioritize strategic objectives for the entire organization.

A client suffered multiple ransomware incidents within 24 months. Although they had made numerous security investments since the incidents, they did not qualify for ransomware coverage. Our security team recommended actions to take on specific critical controls to help the client qualify for ransomware coverage. Our security team helped them reach milestones in their actionable cyber hygiene plan, engaging in meetings with their team to assist them with implementing risk improvement recommendations. Due to the client’s improvements, we could present a competitive quote with the opportunity for improved coverage.

Transforming Cyber Security Failures into Future Success

Cyber incidents can make or break your organization’s ability to secure robust risk transfer options—with traditional cyber insurance models often penalizing organizations for their past. However, Resilience views cyber security through a different lens, recognizing that all organizations deserve a fair chance at securing their digital future regardless of their past.

Our philosophy is simple: We assess cyber risk based on present cyber hygiene rather than past incidents. This approach was evident when we assisted a client grappling with the aftermath of a data breach. The incident had made finding affordable insurance coverage a Herculean task due to past-focused assessments. At Resilience, we knew the path forward involved assessing and enhancing their cyber security posture.

By involving our security team early, we deepened our engagement, leveraged advanced security visibility tools, and revised our assessment of the client’s risk status. This comprehensive understanding and strategic approach allowed us to confidently offer them the insurance coverage they deserved—underscoring our belief that past failures should not dictate future opportunities for cyber resilience.

Ready to revolutionize your cyber security strategy and mitigate future risks with confidence? Request a demo of The Resilience Solution today and take the first step towards true cyber resilience.

You might also like

How to prepare your organization for a post-quantum world

Quantum computing is on the horizon, and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections, what we call quantum decryption, could undermine the trust, confidentiality, and resilience of digital business. This briefing series distills a highly technical topic […]

When will quantum decryption become practical?

As part of Cybersecurity Awareness Month, we’re publishing this three-part series that distills a highly technical topic into strategic insights for leaders. Part 1 explained why quantum decryption poses a threat to current encryption systems. Part 2 lays out credible timelines for when the disruption may arrive. Part 3 will offer practical guidance on how […]

What business leaders need to know about post-quantum cyber risk

Quantum computing is on the horizon and with it comes a seismic shift in how organizations must think about cybersecurity risk. The ability of future quantum machines to break today’s cryptographic protections–what we call quantum decryption–could undermine the trust, confidentiality, and resilience of digital business.                                                                                          As part of Cybersecurity Awareness Month, throughout October we are […]

The false promise of paying criminals to delete your data

On October 6, 2025, hackers demanded ransom from Salesforce for nearly one billion stolen customer records. The company’s response was unequivocal: no payment, no negotiation. While the refusal made headlines, the more important question is why Salesforce—and increasingly, other mature organizations—are walking away from the table when criminals offer to “suppress” stolen data. The answer […]

A CISO’s guide to winning the annual budgeting battle

It’s that time of year again. Finance has sent the email with the budget template attached. Your CFO wants preliminary numbers by next week. And you’re staring at a spreadsheet wondering how to justify the security investments your organization desperately needs when last quarter’s board meeting included the phrase “do more with less.” Welcome to […]

How brokers and CISOs can lead the charge for Cybersecurity Awareness Month 2025

October is Cybersecurity Awareness Month, and this year’s theme—”Building a Cyber Strong America“—has never been more relevant. For over two decades, this initiative led by CISA and the National Cybersecurity Alliance has spotlighted the importance of taking daily action to reduce online risks. In 2025, the focus shifts to the government entities and small-to-medium businesses […]