Mapping the coverage of security controls in cyber insurance proposal forms
Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process that applicants need to go through to apply for cyber insurance. A typical process would require an applicant to fill out a proposal form, whic...
Main Authors: | Woods, D, Agrafiotis, I, Nurse, J, Creese, S |
---|---|
Format: | Journal article |
Published: |
SpringerOpen
2017
|
Similar Items
-
Mapping the coverage of security controls in cyber insurance proposal forms
by: Daniel Woods, et al.
Published: (2017-07-01) -
The data that drives cyber insurance: a study into the underwriting and claims processes
by: Nurse, JRC, et al.
Published: (2020) -
A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
by: Agrafiotis, I, et al.
Published: (2018) -
Analysing cyber-insurance claims to design harm-propagation trees
by: Axon, L, et al.
Published: (2019) -
A system to calculate cyber-value-at-risk
by: Erola, A, et al.
Published: (2021)