Skip to main content

In a nutshell: Cyber Pre-Claim Intervention

Cyber perils can be malicious by nature. You need a way to have an element of control in an uncontrollable world. We watch your book, alert you, and provide tools to help you avoid the breach - and the headache.

Updated over 2 months ago

What it is: Cyber Pre-Claim Intervention is a module within the BreachRisk™ for Insurance platform.

Its purpose is to monitor your book of clients, alert you during routing and emergent threats, and provide productive facts to help carriers, brokers, clients, and their technology providers quickly identify, validate, and address threats before the breach - avoiding claims, confusion, and headaches.

Its also designed to enhance The Cyber Questionnaire Validator, because underwriters seeking faster quote-to-bind can write business with the confidence that they will have active risk management capabilities in place.

Who it's for: Cyber brokers and carrier claims managers/active risk managers

Purpose of this article: Convey foundational concepts of the nature of Cyber Pre-Claim Intervention quickly, to help you dive in to more advanced topics without getting really confused

Cyber Pre-Claim Intervention is:

  • a threat monitoring service

  • from the hacker perspective

  • that watches your entire book

  • up-to-date with latest threats

  • designed with brokers & carriers

  • answers during emergent cyber threats

Cyber Pre-Claim Intervention is not:

  • replacing threat analysts

  • just "a simple external scan"

  • expecting you to be an expert

  • wasting your time with false positives

How it works

Using only the name of the applicant and the website, Cyber Pre-Claim Intervention ("pre-claim" for short) monitors threats against all clients in your book.

  1. Provide name and website of client to the BreachRisk™ platform

  2. BreachRisk™ a.i. uses hacker tradecraft to automatically, continuously, and ethically plan attacks against the applicant

  3. Optionally, clients can participate and even perform active penetration testing (see articles about our advanced threat sharing schemes)

  4. Conduct routine analysis, or wait for priority alerts about individual clients and emergent threats

  5. When a threat arises, download artifacts with facts to help you communicate with the carrier, broker, policyholder, and their technology service provider to pinpoint issues

  6. Track the client over time and build trends that support swift renewals that are compatible with The Cyber Questionnaire Validator

What to read next

Proceed further along the articles in this category for guidance on how to leverage capabilities of Cyber Pre-Claim Intervention.

If you haven't already, consider reviewing the grand concept and Lloyd's TED Talk from our very-American co-founder in London.

Did this answer your question?