The Cyber5 Podcast

Analysis of Betterment and Exclusions of Cyber Insurance with WTW Vice President Heather Wilkinson

Episode 15 of the podcast covers how a cyber incident is defined by insurance carriers, how that is changing, and an in-depth analysis of betterments and exclusions often overlooked in cyber insurance policies with Heather Wilkinson, Vice President at Willis Towers Watson.

  • (00:48) Intro
  • (01:13) Question 1: How do most cyber policies define a cyber incident?
  • (03:54) Question 2: What do cyber policies cover once a cyber incident has occurred?
  • (04:44) Questions 3: With betterment language, what will cyber insurance pay for with regard to remediations?
  • (12:30) Question 4: What are important exclusions to pay attention to and what can be done to have them included in your policy
  • (16:33) Question 5: What are some new themes and trends you see going forward in the cyber insurance market?

Episode 15 | July 24, 2020

Adversary Research
Discovering the methods, motives and identity of threat actors to disrupt attacks 
Reputation Defense
Technical guidance for countering disinformation and slanderous attacks 
Trust & Safety
Intelligence to secure business operations and defend against fraud, abuse and e-crime 
TPRM Exposure
Adversary-centric intelligence to address supplier, M&A and investment risks 
Outside Intel
Research for defending outside the firewall that leverages tier 3 intelligence programs 
Executive Shield
Assessment of threats to key personnel with attribution and PII takedown  
Adversary Insights℠ Retainer
Annual retainers for client-driven inquiries and rapid-response research 
Intelligence Team as a Service
Collaborative engagement providing robust intelligence and tier 3 cyber analysts  
Event-Driven Intel Investigations
Multidimensional security fact-finding that delivers insights into adversary behavior 
On Demand Threat Research
Proactive and preventative investigations that reveal threat actor context and risk correlations 
Investment Zero Touch Diligence℠
Project-based discovery to assess risk for investments, IPO, Mergers and Acquisitions 
TPRM Zero Touch Diligence℠
Subscription assessment of external network hygiene, key personnel, and non-traditional business risks