A digital graphic of a lock, surrounded by binary code and the words The first step in evaluating the viability of using a captive to cover cyber risks is to determine whether taking on additional risk is sensible given your company's financial strength, capital objectives and tolerance for risk. (Credit: kras99/stock.adobe.com)

Most organizations today face exposure to cyber and technology threats as they continue to expand, grow and operate. Data privacy and security breaches, business interruption expenses, investigative and restoration efforts and harm to an organization's reputation can be damaging and costly.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

  • All PropertyCasualty360.com news coverage, best practices, and in-depth analysis.
  • Educational webcasts, resources from industry leaders, and informative newsletters.
  • Other award-winning websites including BenefitsPRO.com and ThinkAdvisor.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.