Skip Navigation
Skip to Content
Skip Navigation
Skip to Content

Cyber Insurance

Make sure you have responsive guidance when it matters most.

 

AIG’s award-winning solutions can connect clients with some of the world’s top cybersecurity, law, and public relations firms to help safeguard against sensitive data breaches, computer hacking, employee error, and more. From innovative loss prevention tools to breach resolution, we help you stay ahead of the curve.

Add our expertise to yours.

Address the Spectrum of Cyber Risk with AIG

Corporate Data Risk, Business Interruption, Cyber Extortion, and More

CyberEdge®, our end-to-end cyber risk management solution provides you access to tools, products, and resources from some of the world’s leading cybersecurity, law, and public relations firms.

Learn More

Bodily Injury, Property Damage, Business Interruption, and Product Liability

CyberEdge® Plus, can provide primary financial and event management support if a cyber-attack causes company property to be damaged, business to be interrupted, customers or other third parties to be injured, and third-party damage to property. Excess coverage for bodily injury, property damage, and financial loss is also available through CyberEdge® PC.

Learn More

Personal Identity Coverage

Get professional, around-the-clock assistance and financial relief for employees, customers, and family members who are exposed to identity theft.

Learn More

AIG Study: Is Cyber Risk Systemic?

AIG polled global cyber security and risk experts to explore their views on the probability and impact of a systemic cyber-attack.  Learn more about the likely targeted industries and scenarios in our latest cyber risk report.

Benefits of Cyber Insurance from AIG

End-to-End Risk Management

Gain confidence knowing you’re covered by an industry leader with one of the oldest programs addressing cyber risk. AIG was one of the first insurers to take a broad and unified approach to cyber threats, understanding that risk goes beyond data protection.

Learn More

Global Claims Expertise

The CyberEdge Breach Resolution Team is ready to assist insureds as soon as they suspect a potential network breach. Our team has local presence supported by global resources, allowing our experts to manage unfolding events and quickly respond to inquiries.

Learn More

CyberEdge®


Learn how cybersecurity is one of the main issues facing your Board of Directors … and how you should address it.

Download the CyberEdge Mobile App

AIG developed the CyberEdge Mobile App in response to the clear demand for information about cyber risk and how to help mitigate and respond to it. With many features globalized, our app puts the cyber information users want at their fingertips.

Download for iPhone

Download for iPad

 Download for Android

Strategic Partnerships

K2 Intelligence

K2 Intelligence can provide customized threat intelligence – including from the dark web via K2Watcher – that is extremely valuable to organizations as cybercrimes continue to increase in our digital, interconnected world.

Learn More

IBM

IBM Security conducts remote scanning for external Web infrastructures to help identify vulnerabilities. This helps prioritize hidden risks to help organizations address them quickly.

Learn More

RSA

RSA’s Governance, Risk, and Compliance (GRC) industry-leading solution helps organizations assess their cybersecurity risk, leveraging the NIST Cybersecurity Framework.

Learn More

Take your free cybersecurity maturity assessment now

BitSight

BitSight generates security ratings for organizations to measure and monitor their own network and those of third-party vendors.

Learn More

Axio Global

Axio Global can provide clients with a holistic picture of their cyber exposure by addressing the full range of potential losses, including data theft, property damage, bodily injury, and operational disruption.

Learn More

Learn More About AIG’s Cyber Insurance Offerings

AIG Cyber Insurance Professionals Are Here to Help

AIG provides coverage, tools, and continued access to emerging best practices – learned from years covering and evolving with today’s business technology.