Skip to content

Discerning Data

  • About Us
  • Additional Resources
  • Contact Us

DISCERNING DATA

A Faegre Drinker Blog Covering the Latest in Privacy, Cybersecurity and Data Strategy

  • Privacy
  • Cybersecurity
  • Data Strategy
  • Disruptionware

A Cyber Hygiene Strategy: Cyber Insurance Endorsements

Share

In the insurance industry, an “endorsement” is used to amend an insurance policy. Endorsements can be used to add items to a policy, amend policy provisions, or update an insured’s coverage. Endorsements also can be used to provide directions to third parties with whom an insured can work if a claim is made under a policy.

Specifically, insured parties can use endorsements in connection with their cyber insurance policies in order to set in advance the outside advisors – e.g., cyber forensic consultants, outside legal counsel, P.R. firms, etc. – that the insured will utilize in the event of a cyberattack, data breach, or other event triggering the cyber policy. Many companies who are victimized by cyberattacks or data breaches often waste critical time in the crucial hours and days after an attack trying to find appropriate forensic consultants and outside counsel. Even companies who have cyber insurance policies often suffer from delays in being paired with “panel” forensic and law firms recommended by their carriers. Moreover, the insured party typically has no prior relationship with the panel firms, which can result in further delays as the consultants and law firms have to obtain a basic understanding of the business and their points of contact before beginning the substantive response efforts that are so vital to success.

By contrast, companies who have thoughtfully utilized an endorsement to designate their preferred third-party advisors know exactly who to contact in the event of a cyberattack, data breach, or another triggering incident. Moreover, designation of cyber forensics firms and law firms in advance of an attack or incident allows the third-party advisors to develop a relationship with the insured and understand the insured’s business before an attack occurs. This substantive knowledge and prior relationships with key points of contact within the company can save valuable time and money, and, often, they can make a significant difference in the result of the response to the attack.

Developing relationships with third-party advisors in advance of an attack or cyber incident is one of the cornerstones of good “cyber hygiene.” And, if a company does develop these relationships, it would be wise to consider utilizing an endorsement for a cyber insurance policy to allow the company to continue to utilize its trusted advisors in the wake of a cyberattack or data breach. Such actions can save time and money, and they can be crucial in terms of achieving a successful outcome in the wake of an attack.

 

The material contained in this communication is informational, general in nature and does not constitute legal advice. The material contained in this communication should not be relied upon or used without consulting a lawyer to consider your specific circumstances. This communication was published on the date specified and may not include any changes in the topics, laws, rules or regulations covered. Receipt of this communication does not establish an attorney-client relationship. In some jurisdictions, this communication may be considered attorney advertising.

About the Author: Jane Blaney

Jane Blaney assists clients seeking solutions related to insurance matters, with concentrated knowledge in health insurance, health insurance regulation and technology services. View Jane's full bio on the Faegre Drinker website.

About the Author: Jason G. Weiss

Jason G. Weiss leverages a past career as a cybersecurity and computer forensics Supervisory Special Agent with more than 22 years of decorated service at the FBI to guide clients through the complex and high-stakes issues associated with cybersecurity incident preparedness and response and compliance. View Jason's full bio on the Faegre Drinker website.

About the Author: Peter Baldwin

Peter Baldwin draws on his experience as a former federal prosecutor to counsel clients facing government investigations and cybersecurity issues. View Peter's full bio on the Faegre Drinker website.

Receive Email Alerts to New Articles

SUBSCRIBE

April 12, 2022
Written by: Jane Blaney, Jason G. Weiss and Peter Baldwin
Category: Cybersecurity
Tags: cyber insurance, Insurance

Post navigation

Previous Previous post: Congress Passes New Cyber Incident and Ransomware Payment Reporting Legislation
Next Next post: U.S. Government Details Prolonged Cyber Scheme by Russian State Actors Targeting the Energy Sector

Search the Blog

Sign Up for Email Alerts

PODCASTS

Faegre Drinker on Law and Technology

©2023 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Lawyer Advertising.

  • About Us
  • Additional Resources
  • Contact Us
We use cookies to improve your experience with our website. By browsing our site, you are agreeing to the use of cookies. For more information about how we use cookies, please review our privacy policy and cookie policy. OK
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT