A digital graphic of a lock, surrounded by binary code and the words The first step in evaluating the viability of using a captive to cover cyber risks is to determine whether taking on additional risk is sensible given your company's financial strength, capital objectives and tolerance for risk. (Credit: kras99/stock.adobe.com)

Most organizations today face exposure to cyber and technology threats as they continue to expand, grow and operate. Data privacy and security breaches, business interruption expenses, investigative and restoration efforts and harm to an organization's reputation can be damaging and costly.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.