Cyber Catastrophe Modeling

Manage your catastrophic cyber exposure across any book of commercial insurance.

Proprietary Cyber Catastrophe Modeling Framework 

Kovrr has developed a proprietary cyber modeling framework, designed to estimate the impact probability and severity of cyber catastrophe events. The framework is used to generate an event catalog that represents historic events and probabilistic future catastrophic events with different levels of severity. The exposure of the portfolio is examined against all or specific scenarios and takes into account tail events ranging from cloud provider outage to wide-scale ransomware attacks.The expected damage is calculated based on a portfolio’s vulnerability assessment.

Customized Models

Kovrr enables (re)insurers to model and assess their catastrophic cyber exposure based on different levels of data granularity input. Kovrr’s dashboard empowers (re)insurers to comprehensively analyze their portfolios by examining exposure and risk on different portions of their portfolio and different types of scenarios. This analysis allows (re)insurers to reflect their risk approach in the model and can help determine onboarding approaches, risk appetite, and capital allocation strategies.

Quantifying Exposure for a Specific Event

(Re)insurers can easily assess the cyber exposure of any type of insurance book using a list of predefined scenarios, based on historical events, probabilistic events and on the current cyber threat landscape. For example, using Kovrr, a reinsurer can quantify the exposure of its property book to a large scale business interruption event such as the NotPetya ransomware attack or the Mirai IoT botnet denial of service attack.

See full case study:

Quantifying Silent Cyber Risk Accumulation
Why Visibility is Key to Managing Catastrophic Silent Cyber Exposure

Reinsurers currently face challenges in quantifying their total underlying exposure to cyber risk within other business lines - often referred to as silent cyber risk. Check out how this reinsurer adjusts its portfolio mix to mitigate silent cyber risk accumulations.
Download Now

Contact Us

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.