Information security management — Guidelines for cyber-insurance
This document gives guidelines for:
a) considering the purchase of cyber-insurance as a risk treatment option to share cyber-risks;
b) leveraging cyber-insurance to assist manage the impact of a cyber-incident;
c) sharing of data and information between the insured and an insurer to support underwriting, monitoring and claims activities associated with a cyber-insurance policy;
d) leveraging an information security management system when sharing relevant data and information with an insurer.
This document is applicable to organizations of all types, sizes and nature to assist in the planning and purchase of cyber-insurance by the organization.