{"id":182,"date":"2019-08-31T12:16:39","date_gmt":"2019-08-31T12:16:39","guid":{"rendered":"http:\/\/127.0.0.1\/csam\/?p=182"},"modified":"2019-10-14T03:53:21","modified_gmt":"2019-10-14T03:53:21","slug":"iso-iec-271022019-information-security-management-guidelines-for-cyber-insurance","status":"publish","type":"post","link":"https:\/\/www.ukm.my\/csam\/iso-iec-271022019-information-security-management-guidelines-for-cyber-insurance\/","title":{"rendered":"ISO\/IEC 27102:2019 \u2014 Information security management \u2014 Guidelines for cyber-insurance"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">There is an expanding global market for \u2018cyber-insurance\u2019, providing options for the transfer of&nbsp;<em>some&nbsp;<\/em>information risks to commercial providers. At present, the focus is primarily on sharing risk and providing compensation for the business costs and consequences arising from \u2018cyber-incidents\u2019 (such as serious privacy breaches caused by hacks and malware infections) that have not been entirely avoided, mitigated or simply accepted by the organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scope and purpose<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">This standard explains:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Essential insurance concepts to information risk and security professionals;<\/li><li>Essential cybersecurity concepts to insurance professionals;<\/li><li>What the insurers and customers of cyber-insurance typically expect of each other;<\/li><li>How to scope, determine, specify and procure appropriate cyber-insurance to managers, procurement and insurance sales professionals, and others involved in the negotiations and contracting process;<\/li><li>The advantages and disadvantages, costs and benefits, constraints and opportunities in this area.<br>&nbsp;<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Status of the standard<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">The standard was&nbsp;<strong>published in August 2019<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Note that unlike other published ISO27k standards, the title has&nbsp;<em>\u201cInformation security management\u201d<\/em>&nbsp;in place of the usual&nbsp;<em>\u201cInformation technology &#8211; Security techniques\u201d.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Personal comments<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">This standard flew through the drafting process in record time thanks mostly to starting with an&nbsp;<em>excellent<\/em>&nbsp;donor document and a project team focused on producing a standard to support and guide this nascent business market.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u2018Cyber\u2019 is not yet a clearly-, formally- and explicitly-defined prefix, despite being scattered throughout but unfortunately not actually defined in this standard.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The standard concerns what I would call everyday [cyber] incidents,&nbsp;<em>not<\/em>&nbsp;the kinds of incident we might see in a cyberwar or state-sponsored cyber attack. I believe [some? most? all?] policies&nbsp;<em>explicitly&nbsp;<\/em>exclude cyberwarfare &#8230; but defining that is tricky.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Likewise, depending on how the term is defined and interpreted, \u2018cyber-incidents\u2019 covers a subset of information security incidents. Incidents such as frauds, intellectual property theft and business interruption can also be covered by various kinds of insurance, and some such as loss of critical people may or may not be insurable. Whether these are included or excluded from cyber-insurance is uncertain and would depend on the policy wording and interpretation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The standard offers sage advice on the categories or types of incident-related costs that may or may not be covered &#8211; another potential minefield for the unwary.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">No doubt the loss adjusters and lawyers will be heavily involved, especially in major claims. At the same time, the insurance industry as a whole is well aware that its business model depends on its integrity and credibility, as well as its ability to pay out on rare but severe events. Hopefully this standard provides the basis for mutual understanding and a full and frank discussion between cyber-insurers and their clients leading to appropriate insurance policies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Meanwhile both insurers and insured share a common interest in avoiding, preventing or mitigating all kinds of incident involving valuable yet vulnerable information, which is where the&nbsp;<a href=\"https:\/\/www.iso27001security.com\/html\/iso27000.html\">remaining ISO27k standards<\/a>&nbsp;shine. Insurance is an option to treat the information risks we choose or are forced to accept.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Credit to <a href=\"https:\/\/www.iso27001security.com\">https:\/\/www.iso27001security.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction There is an expanding global market for \u2018cyber-insurance\u2019, providing options for the transfer of&nbsp;some&nbsp;information risks to commercial providers. At<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[25,24],"tags":[],"class_list":["post-182","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-knowledge-domains"],"_links":{"self":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":2,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/182\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}