logo image

Quantify Your Cyber Risk

Take the guesswork out of cyber. Whether managing an existing book or building a new one, use a model that is purpose-built and reflects the evolving nature of cyber risk. 

Evaluate Current Exposure

Identify undetected cyber exposure lurking within your portfolio or discover new market opportunities in a scientifically grounded and transparent way.

Comprehensive Cyber Modeling

Model the diverse range of cyber threats to ensure premiums are adequate and the appropriate capital is reserved. 

Manage Risk Effectively

Stay ahead of the competition by intelligently underwriting, diversifying, and managing both catastrophic and attritional cyber risk. 

Key Cyber Model Features

The comprehensive RMS cyber risk model supports (re)insurers’ end-to-end cyber risk management.

State-of-the-Art Modeling

Reflects current cyber risk insights and research into the underlying causal processes that impact both digital assets and operational technology.

Data Enrichment

Improve model accuracy by backfilling missing exposure characteristics with a global database of over 11 million companies.

Key Loss Analytics

Scenario results and probabilistic model outputs to support setting risk appetite, accumulation management, portfolio management, and capacity allocation.

Model Customization

Incorporate your own view of risk alongside the existing model by adding user-defined alternative model parameters.

Related Cyber Solutions

RMS offers a full range of cyber risk quantification and management solutions to help (re)insurers regardless of the maturity of their cyber business.

Spotlight

Beyond Cyber as a Coverage

The core RMS cyber model can be used to quantify cyber risk arising from a range of scenarios for various coverages and categories of exposure. But to gain a complete view of risk, other RMS solutions can help (re)insurers.

terrorism
Probabilistic Terrorism Model (PTM)

Terrorism can be conflated with cyber risk – both involve human actors with intent to disrupt loss. Our PTM looks at conventional and non-conventional attack methods.

marine-cargo
Marine Cargo and Specie

Estimate potential losses and risks using a vulnerability model custom-tailored to the uniqueness of the cargo and specie lines of business.

offshore-platform
Offshore Platform

Model hurricane damage to offshore platforms, rigs, wells, and pipelines throughout the Gulf of Mexico.

Resources

cyber-risk
Publications
Cyber Risk Outlook 2019

The report provides insights into the rapidly evolving world of cyber risk and describes the latest insights from RMS analysts and modelers in collaboration with the Cambridge Centre for Risk Studies.

Cyber-NotPetya
Blog
Quantify Your Silent Cyber Exposure With These Three Steps

In 2017, WannaCry infected computers in over 150 countries across the globe, taking out critical functions such as the National Health Service (NHS) in the U.K. One year later, the NotPetya cyberattack brought many household names to a standstill. The pharmaceutical giant, Merck, was reportedly the source of US$1.3 billion of total impact to (re)insurers from the NotPetya attack, 87 percent of which was considered silent exposure. These two major cyberattacks…

discusion
Blog
Toward a Science of Cyber Risk

A new article, The Science of Cyber Risk: A Research Agenda has just been published in Science. A free, non-paywall version of this paper is available here. Written by a diverse team of 19 authors, including myself, it presents a concise argument for interdisciplinary research, to establish a scientific basis for risk analysis and management in the cyber security domain. As a leading provider of cyber risk models for the (re)insurance…

system hacked
Blog
Cyberterrorism: A Risk Assessment

Technological advances in communications, computing and computer networks are exposing new vulnerabilities that terrorist groups can exploit, making cyberterrorism a potential security concern. The media has extensively discussed this issue, invoking images of massive economic losses and even larger-scale loss of life from a cyberattack executed by a terrorist group. But just how real is the threat that cyberterrorism poses? Fortunately, the fear…

schema
Publications
Standardized Cyber Exposure Data Schema

A data schema for a growing cyber insurance market. Cyber Insurance Exposure Data Schema v1.0

Cyber Risk Modeling and the Data Skeptics
Events
Cyber Risk Modeling and the Data Skeptics

Cyber modeling is growing up and is now more widely accepted by cyber insurers around the world. Despite the many advances that have improved the model over the past four years, some are still skeptical about cyber modeling, claiming that there’s insufficient data. We believe they’re wrong and that cyber modeling can be used effectively for managing exposure and underwriting. In this webinar, we will take a closer look at the extensive data capture conducted by…

Contact Us

Find the Right Solution for Your Business

close button
Video Title

Thank You

You’ll be contacted by an RMS specialist shortly.

RMS.com uses cookies to improve your experience and analyze site usage. Read Cookie Policy or click I understand.

close