Skip Navigation
Skip Navigation

Cyber Insurance

Make sure you have responsive guidance when it matters most.

 

AIG’s award-winning solutions can connect clients with some of the world’s top cybersecurity, law, and public relations firms to help safeguard against sensitive data breaches, computer hacking, employee error, and more. From innovative loss prevention tools to breach resolution, we help you stay ahead of the curve.

Add our expertise to yours.

Address the Spectrum of Cyber Risk with AIG

Corporate Data Risk, Business Interruption, Cyber Extortion, and More

CyberEdge®, our end-to-end cyber risk management solution provides you access to tools, products, and resources from some of the world’s leading cybersecurity, law, and public relations firms.

Learn More

Bodily Injury, Property Damage, Business Interruption, and Product Liability

CyberEdge® Plus, can provide primary financial and event management support if a cyber-attack causes company property to be damaged, business to be interrupted, customers or other third parties to be injured, and third-party damage to property. Excess coverage for bodily injury, property damage, and financial loss is also available through CyberEdge® PC.

Learn More

Personal Identity Coverage

Get professional, around-the-clock assistance and financial relief for employees, customers, and family members who are exposed to identity theft.

Learn More

Learn how you can help protect your business against one of the latest cyber attack trends: a denial of service attack

Benefits of Cyber Insurance from AIG

End-to-End Risk Management

Gain confidence knowing you’re covered by an industry leader with one of the oldest programs addressing cyber risk. AIG was one of the first insurers to take a broad and unified approach to cyber threats, understanding that risk goes beyond data protection.

Learn More

Global Claims Expertise

The CyberEdge Breach Resolution Team is ready to assist insureds as soon as they suspect a potential network breach. Our team has local presence supported by global resources, allowing our experts to manage unfolding events and quickly respond to inquiries.

CyberEdge®


Learn how cybersecurity is one of the main issues facing your Board of Directors … and how you should address it.

Download the CyberEdge Mobile App

AIG developed the CyberEdge Mobile App in response to the clear demand for information about cyber risk and how to help mitigate and respond to it. With many features globalized, our app puts the cyber information users want at their fingertips.

Download for iPhone

Download for iPad

 Download for Android

Strategic Partnerships

K2 Intelligence

K2 Intelligence can provide customized intelligence that is extremely valuable to organizations as cybercrimes continue to increase in our digital, interconnected world.

Learn More

IBM

IBM Security conducts remote scanning for external Web infrastructures to help identify vulnerabilities. This helps prioritize hidden risks to help organizations address them quickly.

Learn More

RiskAnalytics

RiskAnalytics provides leading global edge threat intelligence and technology that isolates and shuns IP addresses currently being used by criminals.

Learn More

RSA

RSA’s Governance, Risk, and Compliance (GRC) industry-leading solution helps organizations assess their cybersecurity risk, leveraging the NIST Cybersecurity Framework.

Learn More

Take your free cybersecurity maturity assessment now

BitSight

BitSight generates security ratings for organizations to measure and monitor their own network and those of third-party vendors.

Learn More

Axio Global

Axio Global can provide clients with a holistic picture of their cyber exposure by addressing the full range of potential losses, including data theft, property damage, bodily injury, and operational disruption.

Learn More

Learn More About AIG’s Cyber Insurance Offerings

AIG Cyber Insurance Professionals Are Here to Help

AIG provides coverage, tools, and continued access to emerging best practices – learned from years covering and evolving with today’s business technology.