Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementCybersecurity News

Top 3 Cyber Insurance Incident Claims

By Jordyn Alger, Managing Editor
Laptop keyboard in gradient colorful light
Jonas Vandermeiren via Unsplash
April 20, 2026

A new report reveals the top three cyber incidents that account for a majority of reported claims: 

  1. Data breaches (33.5%)
  2. Cybercrime (31.8%)
  3. Extortion events (18.3%)

This data comes from Cowbell’s 2026 Claims Report, which assesses claims made to the organization within the last 18 months.

“With geopolitical tensions and AI innovation defining the cyber threat landscape, the cyber insurance industry is feeling the impact,” the report states. 

According to an AM Best Report, U.S. cyber insurance premiums decreased to $9.14B; however, claims increased by 40%. Cowbell’s report asserts that this trend is “signaling increased loss activity despite reduced premium volume,” which indicates a more active risk environment. 

Below, security leaders share their insights on these findings. 

Security Leaders Weigh In 

Rich Seiersen, Chief Risk Technology Officer at Qualys:

Cyber insurance moves in cycles, wavering between hard and soft markets.

Most analysts anticipate moderate hardening: gradual premium increases, more selective underwriting, and closer attention to security controls. However, it’s doubtful that we’ll return to the severity of previous hard markets, when applicants faced comprehensive questionnaires and long-lasting underwriting delays. A major wildcard is the possibility of a systemic cyber event — a cloud outage, widespread supply-chain compromise, or high-impact ransomware wave that hits many insureds at the same time. An event like this could push the market into a sharper hardening cycle. Still, it’s imperative to recognize that insurance pricing is shaped just as much by macroeconomic factors, such as interest rates, capital flows, and reinsurance pricing, as it is by cyber-specific incidents. Losses matter, but wider financial conditions often dominate the cycle.

This environment also influences how CISOs should think about cyber insurance as part of a coordinated risk-management strategy. Increasingly, CISOs are partnering with CFOs to treat cyber insurance not as a compliance checkbox, but as one component of a broader risk-financing portfolio. With many organizations undergoing rapid digital and AI-driven transformation, this may be a perfect time to reassess the balance between risk transfer (insurance) and risk reduction (controls).

There is meaningful opportunity here for forward-looking companies:

  • Firms with strong security postures can often secure more favorable coverage and larger limits without dramatically increasing cost.
  • Brokers and underwriters are actively looking for ways to differentiate good risks from poor ones, and software platforms that provide clearer visibility into controls and exposure can help insurers deploy capital more efficiently without damaging their loss ratios.
  • For buyers, this creates room to increase coverage economically during a softening cycle, while simultaneously improving resilience.

The challenge is that today’s soft market means buyers have low tolerance for friction. Any security-oriented underwriting tools must be lightweight, fast, and aligned with the realities of the purchasing process. But as the market gradually tightens, organizations that invest early in transparency and measurable security posture may find themselves with more options, and leverage, when seeking coverage.

Randolph Barr, Chief Information Security Officer at Cequence Security:

AI is rapidly evolving from simple automation to deeply personalized, context-aware assistance—and it’s heading toward an Agentic AI future where tasks are orchestrated across domains with minimal human input.

In the haste to bring AI to market quickly, engineering and product teams often cut corners to meet aggressive launch timelines. When that happens, basic security controls get skipped, and those shortcuts make their way into production. So, while organizations are absolutely starting to think about model protections, prompt injection, data leakage, and anomaly detection, those efforts mean little if you haven’t locked down identity, access, and configuration at a foundational level.

Cybersecurity must be part of the development lifecycle from the beginning.

Diana Kelley, Chief Information Security Officer at Noma Security: 

Insurers have moved from self-attestation toward evidence-based underwriting. For traditional cyber risk, that still means strong baseline cyber hygiene, including enforced multi-factor authentication (MFA) for cloud and privileged access, comprehensive and tested backups, endpoint detection and response with 24x7 monitoring, vulnerability management with documented SLAs, and regularly exercised incident response plans. What has changed over the past year is how rigorously insurers expect those controls to be proven, not just described.

What is emerging alongside that is a parallel shift around AI risk. Insurers are increasingly concerned about AI as a source of systemic, aggregated loss. The concern is not just individual failures, but correlated loss driven by shared models, platforms, and agent frameworks. There has already been real financial and regulatory harm from AI failures, including deepfake-enabled fraud, IP exposure through public LLMs, and automated systems making unsafe or noncompliant decisions. As a result, some carriers are exploring AI-related exclusions, while others are beginning to underwrite AI risk explicitly by evaluating the strength of an organization’s AI security and governance controls.

If organizations cannot demonstrate these requirements, the consequences can show up in several ways. At underwriting time, it can mean higher premiums, higher retentions, ransomware or business interruption sublimits, or exclusions tied to AI-driven incidents. Post-incident, claims can be reduced or denied if an organization represented that controls existed but cannot produce evidence that they were enforced and operating as described. Cyber and AI insurance are increasingly conditional products, and without proof, the policy may not respond or pay out as expected when it matters most.

James Maude, Field CTO at BeyondTrust: 

In order to effectively deal with ransomware and other threats, we need to invest in shifting left and think more about securing identities and access to reduce our attack surface and blast radius in the event of compromise rather than just thinking post breach. Ransomware and other threats are only as effective as the privileges and access they manage to acquire so if we can implement better hygiene and focus on least privilege then the threat actors are far less likely to ransomware us in the first place.

KEYWORDS: cyber insurance cybercrime data breach extortion security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Kathmann 5 minutes banner

    Understanding the value and practicality of cyber insurance

    See More
  • Cybersecurity trends of 2025

    3 Top Cybersecurity Trends from 2025

    See More
  • Person working on laptop

    Security experts discuss CISA’s cyber incident reporting portal

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing