Skip To Main Content

Cyber Insurance

New: Specialty Risk Protector - one policy for seamless specialty professional liability and cyber coverage.

Why choose AIG for Cyber Insurance?

In 1999, AIG launched one of the industry’s first cyber security insurance protection programs. We’ve been helping clients navigate this rapidly growing area of risk ever since through detailed scoring and analytics, and insights gathered from 20+ years of experience.

With data now one of the most valuable (and vulnerable) assets an organization can hold, we help our clients understand the nuances of cyber threats, how those threats might evolve, and how to mitigate their risk of a security breach. If an attack occurs, we have solutions that protect against litigation, reputation loss, and remediation.

Coverage (PDF) for physical and non-physical losses resulting from a cyber event on a primary (CyberEdge® or CyberEdge® Plus) or excess/difference-in-conditions (CyberEdge PC®) basis. 

Available limits up to $100M (varying by coverage) and no minimum retention. 

Terms, including limits, retentions, and coinsurance depend on a client’s perceived level of exposure and maturity of cybersecurity and privacy controls, and are based on responses provided in the AIG Cyber Insurance Application (PDF).

Broad appetite across industries, entity types, revenue sizes and geographies.

Eligible policies include cybersecurity services valued at up to $25,000.

The AIG Advantage

With AIG, you get more than just a casualty insurance policy. You get an industry-leading partner who’s dedicated to working alongside you to identify and manage risks, grow your business, uncover new opportunities and discover your true potential. 

  • Provides clients an enhanced cyber risk assessment (PDF) after binding, which could cost a client ~$15k if a client were to engage an outside consultant directly.
  • Helps clients continuously verify cyber risk maturity, prioritize improvements, and improve cyber security investments with CyberMatics® (PDF) – our patented, award-winning technology-driven process

  • Provides clients 24/7 cyber hotline access in the event of a known—or just suspected—incident 
  • Initiates rapid incident response led by an AIG cyber claims expert and AIG’s network of cybersecurity firms 

Advantages in Action

Challenge

AIG’s cyber underwriting process for a healthcare and life sciences client resulted in an “average” rating of the client’s ransomware protection. The client sought expert guidance on improving their risk profile.

Solution

With the support of AIG’s Cyber Risk Advisors and the services included with their policy, the client decreased vulnerability to an attack on their systems.

AIG Benefit

The client saved up to $25,000 in consultancy services by using AIG’s Cyber Risk Advisors and the services included with their policy. With better controls implemented, they improved their ransomware protection to “best in class,” allowing for more tailored policy terms and conditions.

Challenge

AIG identified known malware in a higher education client’s library network and quickly notified them of the vulnerability.

Solution

Working with AIG’s team, the client’s CISO isolated the infected systems, began remediation steps, and retained third-party forensic services to help with the investigation.

AIG Benefit

AIG provided the CISO with their first notification from an insurer about a cyber vulnerability. The CISO appreciated AIG’s actionable information calling it “a feather in AIG’s cap” and a “valuable part of what cyber insurance is going forward.”

Challenge

A successful phishing attack left a client’s computer network infected with ransomware. Several servers were encrypted, and the threat actor demanded $200K in bitcoin for a decryption key.

Solution

Working with AIG’s claims experts and partners, it was quickly determined that infected files could be restored from system backups. No formal notifications were necessary.

AIG Benefit

AIG’s cyber claims team and our relationships with specialized legal and forensic firms helped support and facilitate the client’s response to the event and return them to full operations. No ransom was paid, and the client’s legal and forensic work was covered by the CyberEdge policy.

AIG Cyber at a Glance

AIG Cyber Coverages

We cover physical and non-physical losses resulting from a cyber event. AIG Cyber Insurance can be written through a standalone CyberEdge® policy or endorsed onto select Financial Lines, Property, and Casualty policies. Available limits are up to $100M (varying by coverage) and no minimum retention.  

To find the best fit for your needs, see our cyber coverage guide.(PDF)

Cyber liability insurance covers the financial costs associated with a breach, including but not limited to first-party costs, such as event response, data restoration, network interruption, and cyber extortion.

CyberEdge application (PDF)

Covers losses in the physical world caused by a cyber event, including primary coverage for business interruption, first-and third-party property damage, physical injury to third parties, and products/completed operations coverage.

Cyber coverage that sits excess of traditional property and casualty policies on a DIC/DIL basis. 

CyberEdge PC (PDF)

Detailed Scoring and Analytics

Insureds receive detailed scoring, analysis, and benchmarking reporting that will help them better understand their cyber maturity and coverages.* Basic reports are also available for applicants, even if they do not bind coverage.

Detailed report (Sample) (PDF)

Basic report (Sample) (PDF)

*Subject to submission of AIG’s Cyber Insurance Application

CyberMatics®

CyberMatics® is AIG’s award-winning, patented technology-driven process that can help an organization:

  • Verify its cyber risk posture.
  • Prioritize implementation of controls that reduce its risk.
  • Make better investment decisions in its overall cybersecurity program.

Cybermatics (PDF)

Benefits of Cyber Insurance from AIG

In the many years we’ve been writing cyber security insurance, we’ve learned a thing or two about what our clients want and how to help them prevent a cyber attack.

Brokers: Meet Your AIG Team

View contact information for AIG’s national product and distribution teams.

Downloadable Materials

Download PDF [201.8 kb]

Filename
aig-cyber-highlight-sheet.pdf
Size
210 KB
Format
application/pdf
Cyber Highlight Sheet

Download PDF [73.7 kb]

Filename
new-holistic-approach-for-middle-market-highlight-sheet.pdf
Size
82 KB
Format
application/pdf
Middle Market Value-Add Overview Highlight Sheet

Download PDF [56.9 kb]

Filename
cyber-cover-guide.pdf
Size
56 KB
Format
application/pdf
AIG's Cyber Coverages

Download PDF [86.9 kb]

Filename
cyber-loss-control-services-all.pdf
Size
108 KB
Format
application/pdf
Cyber Loss Control Services

Download PDF [1.3 mb]

Filename
aig-usa-cyber-insurance-application.pdf
Size
1 MB
Format
application/pdf
AIG's Cyber Underwriting Application

Download PDF [104.1 kb]

CyberMatics is AIG’s award-winning, patented technology-driven process that can help an organization.
Filename
cybermatics.pdf
Size
125 KB
Format
application/pdf
CyberMatics

Download PDF [589.0 kb]

Filename
cyber-executive-summary-report.pdf
Size
588 KB
Format
application/pdf
Sample Client Cyber Maturity Report

What is Cyber Insurance?

Even with the most up-to-date security measures in place, cyber-attacks can happen. A cyber-attack (sometimes called a “data breach”) can expose and leverage sensitive information – like passwords, social security numbers, and proprietary work. This makes data one of the most valuable (and vulnerable) assets an organization can hold.

Cyber insurance helps companies assess and mitigate their risk of a security breach and protect against litigation and reputation loss if an attack occurs. 

These policies may also help with other aspects of cyber incidents:

  • Notification to those affected
  • Restoration of information
  • Data recovery
  • Repairs to your company’s computer systems
  • Forensic investigations
  • Ransom reimbursement

The scenarios described herein are offered only as examples. Coverage depends on the actual facts of each case and the terms, conditions and exclusions of each individual policy. Anyone interested in the above product(s) should request a copy of the standard form of policy for a description of the scope and limitations of coverage.