American Academy of Actuaries: Comment Letter to the Treasury Department and FIO on Potential Federal Insurance Response to Catastrophic Cyber Incidents
* * *
To: Attn:
Re: Potential Federal Insurance Response to Catastrophic Cyber Incidents Docket ID: TREAS-DO-2022-0019-0001
On behalf of the
Cyber exposure and cyber insurance are of great interest to actuaries and Academy members. The Committee has compiled a number of cyber-related reports in a "Cyber Risk Toolkit." The Toolkit contains articles on topics such as: the cyber threat landscape, cyber data, risk accumulation, ransomware, cyberterrorism and war, as well as a cyber resource guide, among others. The Toolkit is a living resource in that it is updated and augmented on an ongoing basis.
The Committee has also, on two occasions, (
As the title implies, the report explores state-level requirements for data breach reporting. Reiterating, cyber insurance is a topic upon which the Committee has spent considerable time and effort. The cyber landscape is not static, so our efforts to monitor and understand cyber exposure are ongoing.
In providing comments on cyber risk and cyber insurance, this letter addresses the following:
* Prior Academy comments on TRIA
*
* Cyber catastrophes
* Cyber risk models
* Other considerations
Prior Academy comments on TRIA
Since the implementation of TRIA in 2002, the frequency, severity, and the nature of cyber risks have increased significantly. The current TRIA provisions and the very nature of cyberattacks make it difficult to determine if a cyberattack will be covered under TRIA. There are several criteria that must be met for an act to be certified by the secretary of the
1. committed by an individual or individuals as part of an effort to coerce the civilian population of
2. a violent act or an act that is dangerous to human life, property, or infrastructure; and
3. have resulted in damage within
These criteria are easily identifiable for a physical attack on
Systemic risk also raises challenges for the cyber insurance market including how these attacks would relate to losses covered under TRIA. For example, the
The Committee's letter to FIO (dated
* Cyberattacks do not respect geographic boundaries and can expand across many nations. As such, foreign events that cause damage to an organization within
* Attribution surrounding cyberattacks is difficult to determine, pointing to a key topic in analyzing the interaction between TRIA and cyber insurance-a requirement is to understand which terrorist group caused the cyberattack. Given the nature of cyberattacks, often the exact source, timing, and motivation are not clear, at least for some period of time. Additionally, an attack on a particular target may, perhaps not purposefully, spread the damage to others. Again, the NotPetya attack is an example.
Specific guidance on which types of attacks are considered terrorism, and the relevance of the involvement of foreign governments in determining whether an act is considered terrorism or "war," would provide needed clarity. It would be valuable to examine various scenarios and consider which types of events would be covered under TRIA and which would not. TRIA includes several requirements to trigger the payout of federal funds. One of these is a public finding by the secretary of the
* Coverages included within TRIA are property and casualty insurance as defined under Part 50 subpart A/2 as noted below. These definitions are also reiterated in the
(1) Means commercial lines within only the following lines of insurance from the NAIC's Exhibit of Premiums and Losses (commonly known as Statutory Page 14): Line 1- Fire; Line 2.1-Allied Lines; Line 5.1-Commercial Multiple Peril (non-liability portion); Line 5.2-Commercial Multiple Peril (liability portion); Line 8-
(NAIC =
It is important to note that professional liability insurance is still explicitly excluded from coverage under TRIA. Given that organizations may protect themselves from cyber incidents by utilizing terms and endorsements within professional liability insurance policy forms, this is a potential area of exploration regarding the modification of the lines of insurance covered within TRIA, especially as it relates to cyber-related losses.
On the whole, the cyber insurance market is relatively young. Per the NAIC's 2021 Cyber Supplement, the total
Due to the relatively small premium size of the cyber insurance market and the ever-changing nature of cybercrime, results for this nascent line have been volatile. The NAIC report shows that the average industry loss ratio for the last five years has ranged from 32% up to 66%. The highest loss ratio has occurred in each of the past two years (2020, 2021). This, related back to the evolution of cybercrime, has been caused by a greater incidence of ransomware attacks. The deterioration in loss experience in the most recent two years has been in spite of significant rate increases that occurred throughout 2021 and into 2022. Coverage terms have been tightened and insurers have demanded a more robust security posture due to the deterioration of loss results.
In light of the potential catastrophic exposure of the cyber line, it is important to understand the insurance industry's capacity. One common way to quantify this capacity is the industry surplus (capital base). Insurance premiums are estimated and set so as to fund the expected losses and expenses of the insurance risk transfer. This estimation is done at some point prior to when an insurance policy is issued and goes into effect. Surplus provides a buffer should those a priori estimates and resulting premiums prove to be insufficient in the near term. In short, surplus allows the industry to absorb unexpected losses, and it provides a level of safety to the customers relying on the insurance market. The
Cyber Catastrophes
Unlike natural catastrophe risk, cyber risk comes with a rapidly changing landscape where bad actors seek to identify high-value and/or opportunistic targets and also change the type of attack and malware. Additionally, the same cyber events can be used globally almost simultaneously. To mitigate risk, insurers and reinsurers look to diversify their portfolios. It should be noted that traditionally insurance companies might enter swaps with other carriers to diversity sector exposure and/or geographic exposure, believing if one sector or geography has a problem, it's likely another will not sustain a loss. However, the same cyberattack can be deployed on a large financial institution based in
A distinguishing feature of cyber risk is that cyber catastrophes are typically manmade. An active adversary and motivational aspects of cyberattacks affect which entities are targeted. While people can be evacuated from the expected path of a hurricane to reduce the risk of harm, an active cyber adversary can adapt new tactics to cause damage that are not anticipated. Cyber catastrophic losses are also not isolated in confronting further risks. An earthquake in
NotPetya was the most expensive cyberattack ever. NotPetya caused over
In the spring of 2017, Russian military hackers were able to create a hidden back door into computers around the world that had MEDoc installed. When NotPetya was released, it spread automatically, rapidly, and indiscriminately. NotPetya irreversibly encrypted computers' boot records. No key existed to repair the computers. Multinational companies including Maersk, Merck, TNT Express, Saint-Gobain, Mondelez, and Reckitt Benckiser were victims of the attack. Approximate costs/4 of the damage for these companies (as of
* Merck
* TNT Express (FedEx's European subsidiary)
* Saint-Gobain
* Maersk
* Mondelez
* Reckitt Benckiser
These amounts do not include impacts that are harder to measure such as Maersk's disruption to the global supply chain, the inability of Merck to manufacture some medications, or any reputational damage.
Merck sued its insurers (
A lawsuit was filed by Mondelez in
The
The hack infected some of the
The attackers stole 100 gigabytes of data within a two-hour window. Following the data theft, the attackers infected the Colonial Pipeline IT network with ransomware that affected many computer systems, including billing and accounting. The pipeline was shut down to prevent the ransomware from spreading.
The impact of the attack was significant, causing fuel shortages for many airlines with disruption at airports. Panic-buying and long lines at gas stations impacted many states, and gas prices spiked.
The attackers asked for approximately
While the total cost of the damage just to Colonial is not clear, the company sued its insurer and stated "that it suffered more than
Cyber Risk Models
Like catastrophe modeling for hurricanes, the cyber insurance market has undertaken to develop cyber models to measure aggregated losses and manage the exposure to large events. However, these latter models are far less mature in their development that other insurance risk models which are based on much longer experience and data.
Cyber risk models help the insurance industry attempt to quantify risk due to various types of cyber events. Cyber risk and cyber insurance are very new, as such modelling firms are rapidly modifying their models to blend industry expert opinion as well as (limited) historical experience. It should be noted that financial projections from the various insurers can be substantially different due to the rapidly evolving cyber landscape and the unique challenges for the insurance industry that cyber presents. The financial projections from a single firm can also vary significantly from one model iteration to the next as new information becomes available, views of the risk shift and also some coverages are changed.
At the
Vendors providing cyber accumulation modeling services can be broadly grouped into two camps: traditional catastrophe insurance modelers expanding into cyber risks, and the typically newer cyber risk service providers moving into insurance. Generally speaking, the natural strengths and weaknesses of each type of vendor have become less pronounced as they are quickly learning from each other and the cyber market matures.
Many cyber accumulation model vendors were originally IT service providers, and they tend to have more in-house cyber expertise. Where data is sparse, expert judgment becomes increasingly important for assessing the next big emerging risk in the cyber domain, as well as staying on top of the dynamic landscape. Different models provide different degrees and types of flexibility in customizing parameters to reflect different views on cyber risk.
Due to data reporting requirements and data collection methods, data may have a bias toward newsworthy, data breach events. Many cyber model vendors partner with others and incorporate multiple other data sources including outside-in scans (gathered from the public space), inside- out scans (gathered from an organization's internal network), threat monitoring (vulnerabilities on the surface, deep and dark webs) and firmographic data (company characteristics such as revenue and employee count).
Many vendors have built their databases though internal efforts and in partnership with others. Some vendors hire teams of "white hat" hackers to map out company networks and direct the types of data captured. Other creative methods include scraping online IT job ad requirements to make inferences about a particular organization's software and systems. The fact remains, however, that many small companies are still not included in these databases, and one may need to adopt a deterministic market share approach as a result. However, the small company databases are growing quickly as more vendors target small businesses in their initiatives.
Accumulation modeling, and cyber risk modeling in general, are very active fields of endeavor and consequently subject to continual redevelopment and improvement. This means that the relative strengths and weaknesses of each vendor's products can be expected to shift and change over time. From an insurance writer's perspective, it may well be the case that no single vendor is able to completely capture cyber accumulation risk with a high degree of comfort. Inevitably, the cost to build and maintain models is a major factor to consider. Because of the difficulties that underlie accumulation risk modeling, managing the exposure may be as important as trying to accurately measure the risk.
Other Considerations
As FIO weighs considerations around a potential federal insurance response, we call to your attention the following:
* The current maturity level of the cyber insurance market should be factored in. While the market will undoubtedly continue to evolve, the current cyber insurance market will be subject to prudent risk and capacity management by insurers participating in the market.
* Consideration should be given to the potential and likely size of significant cyberattacks and clarifying the TRIA mechanism to address such an event.
* Further investment by the public sector and private entities in cyber security and risk mitigation should be encouraged.
If you have any questions about this letter or seek additional information from the Academy, contact
Sincerely,
Chairperson
* * *
Original text here: https://www.actuary.org/sites/default/files/2022-12/Committee_on_Cyber_Risk_FIO_comment_letter_12142022.pdf
ALTA Reports 20.6% Decrease in Q3 Title Insurance Premium Volume
Global B2B2C Insurance Market Size Value Expected to Touch USD 5.79 Billion by 2030, to See 6.7% CAGR Growth: Polaris Market Research
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News