SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Cysurance & Check Point: Cybersecurity insurability program

5 Dec 2024

Cysurance & Check Point: Cybersecurity insurability program
Contact company
Contact Check Point Software Technologies Inc
icon Add as a preferred source Download PDF version
Related Links
  • Top 3 cyber-attacked industries in Q2 2024: Check Point report
  • S&P Global: Cyber security essentials for servicers
  • Check Point Global Threat Index: LockBit resurgence

In a vidcast interview for journalists, industry pioneers Kirsten Bay, CEO of Cysurance, and Enterprise Security Architect Randle Henry from Check Point, shed light on the emerging role of insurability assessments in bridging the gap between cybersecurity and insurance.

The conversation put into context the Cysurance Insurability Assessment Program, Powered by Check Point – a joint initiative that is bending the risk curve in favour of businesses by assessing and managing their cyber exposure profiles.

New approach to cybersecurity insurability

The program was set as a key to the growing need for firms to assess their security posture

The program was developed as a solution to the growing need for businesses to assess their security posture accurately and improve their insurability. Henry explained the fundamental goal of the program: "The insurability assessment is a way for insurance companies to reduce the cost of their policies by assessing their clients' security posture. We’ve broken this down into three different programs based on the size and complexity of the organisation to provide visibility and map out issues that clients may not even be aware of."

By focusing on the client's cybersecurity infrastructure, the assessment helps insurers, brokers, and businesses work together to understand and address vulnerabilities that could jeopardise their organisations.

Comprehensive cybersecurity review

Bay emphasised the importance of this program for brokers, especially those who do not tend to focus on cyber policies and lack deep infosec expertise. "Applications for cyber insurance have become increasingly complex, and many brokers are not cybersecurity specialists," Bay noted. "This program supports brokers by simplifying the assessment process, providing clarity, and verifying the most important security controls are in place. It removes the need for attestations, replacing them with an assessment-backed insurance policy, which can lead to significant reductions in premiums."

The program’s combination of insurance with a comprehensive cybersecurity review gives brokers a powerful tool to offer to clients, enabling them to provide a more accurate, streamlined package for cyber insurance.

Bridging the gap between security and insurance

For the broker community, the value of this program lies in its ability to help both insurers and clients

For the broker community, the value of this program lies in its ability to help both insurers and clients. By streamlining the application process and providing actionable insights, brokers can offer more targeted insurance solutions. Bay explained how this benefits both sides. "The program creates transparency and aligns the broker’s offering with the customer's real-world security needs, reducing paperwork and providing verified information on their security posture."

The program also helps insured organisations. By offering clear, actionable steps, companies can improve their security posture, increasing their chances of receiving favourable insurance terms. "We don't want to just give them a report and walk away," Henry emphasised. "We provide key indicators of what they have, what they need, and where there are gaps. This allows businesses to address their security challenges before they become deal breakers in securing insurance."

Simplifying complex risk assessment

One of the standout features of the program is its simplicity. While cybersecurity risk assessments can traditionally be a lengthy and complex process, the Cysurance Insurability Assessment has significantly reduced that burden.

As Henry explained: "A full assessment can take eight-to-10 weeks. But for our smallest assessments, we can complete the process in just a few days. We've simplified the process into smaller, more manageable questions based on the level of risk." This tiered approach allows businesses of different sizes and industries to be evaluated appropriately, ensuring that they are neither overburdened with unnecessary assessments nor underinsured due to missed risks.

Building an association between security and executive teams

Bay highlighted that this alignment helps drive meaningful change at the board level

Another significant benefit is the way the program supports communication between cybersecurity teams and executive leadership. Bay highlighted that this alignment helps drive meaningful change at the board level. 

"This is less about auditing security teams than it is about helping cyber professionals better communicate with the executive staff. The assessment provides a clear independent analysis showing what they're doing right and where improvements are needed, which helps everyone get on the same page when discussing insurability." This transparency not only strengthens the relationship between the broker, the client, and the insurer but also provides critical insights that allow businesses to prioritise their cybersecurity investments more effectively.

A new opportunity for brokers

The collaboration between Cysurance and Check Point offers brokers a unique opportunity to expand their offerings and enhance their role as trusted advisors. The ability to bundle cybersecurity assessments with insurance policies makes it possible for brokers to provide a more comprehensive service to their clients.

The package allows brokers to offer cyber insurance policies to clients they may not have come before

"When this assessment, combined with the insurance policy, allows brokers to participate in both the professional service fee and the insurance commission. It’s a win-win, especially when you consider that brokers can now play a critical role in reducing premiums costs to their clients without sacrificing their own revenue generation," noted Bay.

The package also allows brokers to offer cyber insurance policies to clients they may not have approached before. "Many brokers aren't quoting cyber insurance for every client, simply because they aren't sure how to speak to the needs of cybersecurity," said Bay. "With this assessment, they can now bridge that gap and confidently offer tailored solutions."

A new standard for the future

With the Cysurance Insurability Assessment Program, both Bay and Henry see a future where cybersecurity and insurance are better aligned, creating a more secure and financially stable environment for businesses. By offering brokers a clear path to assess and insure clients, and by empowering businesses to take proactive steps to improve their security posture, the program provides an essential service in today's risk-laden digital landscape.

As businesses continue to face ever-increasing cyber risks, the integration of cybersecurity assessments and insurance is becoming not only a smart strategy but also a necessary one. "Our goal is to reduce costs for the end customer while creating additional economic opportunities for the broker community. This program does exactly that," Bay concluded.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Commercial security
  • Security access systems
  • Security software
  • IP security solutions
  • Cyber security
  • Internet of Things (IoT)
  • Corporate Security
  • Artificial intelligence (AI)
  • Mergers & Acquisitions
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Barricades
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Explore the groundbreaking Cysurance Insurability Assessment Program in partnership with Check Point, revolutionising cybersecurity insurability. Assess, manage, and improve your organisation's security posture for better insurance terms.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec