Creating a Federally Sponsored Cyber Insurance Program
Report from Digital and Cyberspace Policy Program
Report from Digital and Cyberspace Policy Program

Creating a Federally Sponsored Cyber Insurance Program

Cyber Brief

November 2016

Report

The U.S. federal government has long debated using insurance as a tool to create incentives for better cybersecurity in the private sector, and has tried to prod the insurance industry to offer cyber coverage. Meanwhile, financial firms and industry groups have pushed the federal government to create a backstop for cyber insurance, arguing that the U.S. government is likely to end up footing the bill should a catastrophic cyber incident occur.

Robert K. Knake

Whitney Shepardson Senior Fellow

When catastrophes have occurred in other areas, Congress has enacted legislation to repair the damage and made efforts to prevent a similar incident from happening again. This pattern played out following 9/11, Hurricane Katrina, and the 2008 financial crisis, to varying degrees. Anticipating a catastrophic event in cyberspace, Congress should put in place a federal backstop for cyber insurance. Doing so would set expectations for the market and, if constructed properly, reduce the likelihood of a catastrophic cyber event by stimulating the adoption of best practices through insurance requirements and creating incentives to participate in programs that reduce risk for everyone connected to the internet.

Background

More on:

Cybersecurity

United States

Digital Policy

The Federal Insurance Office estimates that the U.S. market for cyber insurance was as high as $2.75 billion in 2015, as measured in collected premiums. PricewaterhouseCoopers projects (PDF) that the market will grow to $7.5 billion by 2020. But coverage is far from universal. Despite knowing the risks, most companies are not purchasing cyber insurance. According to a report from Marsh, the world’s largest insurance broker, only 15 percent of its clients had standalone cyber insurance, and insurers are quickly working to exclude cyber events from other policies.

Companies that purchase insurance may be subject to high premiums, low limits, exemptions for the types of incidents covered, or all three. Coverage beyond $500 million per incident is currently unavailable on the market; however, the Federal Insurance Office notes that some experts believe that coverage beyond $1 billion is necessary. Moreover, because of the systemic risks posed by cyberattacks, total losses could easily exceed the capacity of insurers to make good on all claims, necessitating government intervention. Lloyd’s of London estimates that a cyberattack on the U.S. East Coast power grid could result in $1 trillion in economic losses and $71 billion in insurance industry losses, primarily from business interruption, property damage, and injury or loss of life.

For more than a decade, policymakers have considered whether the threat of such a catastrophic cyberattack could require a federal backstop similar to those established for other risks. Following 9/11, Congress created two programs to address the liability concerns that the private insurance market could not. The Terrorism Risk Insurance Program (TRIP) helped commercial property development recover after the attacks. The Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) encourages companies to develop antiterrorism technologies that otherwise might not exist because of the small market size and unclear liability if their products failed. Under both programs, the U.S. government must certify an incident as an act of terrorism before a payout is made.

Insurers do not typically offer premium reductions in exchange for improving cybersecurity practices.

The SAFETY Act has evolved from its initial focus on providing liability protection for technologies such as radiation detectors to providing liability protection for counterterrorism plans for stadiums and other venues. Both TRIP and the SAFETY Act could, in their current forms, provide coverage in the event of a catastrophic cyber incident. Several organizations have proposed expanding the use of the SAFETY Act for cybersecurity.

Challenges to Creating Cyber Insurance

Federally backstopped cyber insurance could be used to address a series of widely recognized and persistent cybersecurity problems. Currently, too few companies share information on cyber threats, so attackers are more likely to successfully reuse malware, exploit the same vulnerabilities, and use the same methods against multiple companies or organizations. The Federal Insurance Office and other industry reports note a lack of actuarial data as a persistent problem that inhibits insurers from accurately pricing risk. Without sufficient data, insurers will continue to avoid financial risk both by limiting the size of policies and the scope of what they cover.

More on:

Cybersecurity

United States

Digital Policy

Although some insurers are amassing data to more accurately price risk for the theft of data such as credit card numbers or personally identifiable information, no company has sufficient information to price risk for destructive attacks. Moreover, insurers do not typically offer premium reductions in exchange for improving cybersecurity practices. This market decision reflects a sad reality for the cybersecurity industry: there is no clear consensus on which cybersecurity practices work and which do not, though some insurers are developing closer relationships with cybersecurity providers in order to access information necessary to accurately price risk. Some technical protocols that can prevent the spoofing of email addresses are only effective if all organizations in a given industry implement them.

Although a federally backstopped insurance program could be used as an incentive to address these challenges, if developed incorrectly, it could displace the private market and leave taxpayers to foot the bill. The National Flood Insurance Program owes the Treasury $23 billion and, in the view of the Government Accountability Office (GAO), has no viable path to repay it based on premiums collected and projected payouts. The GAO estimates that federal crop insurance programs cost taxpayers approximately $8.4 billion a year. Any federal action on cyber insurance should promote the growth of the market, account for systemic risks, and avoid creating a subsidy for predictable cyber events.

Recommendations

A federally sponsored cyber insurance program should use the promise of limited financial liability to promote participation in initiatives that benefit the security of the internet as a whole and reduce systemic risk. Initially, the government’s goal should be to use the program to promote the sharing of data on incidents so that insurers can accurately price risk and set premiums. Doing so could provide the data necessary to judge the effectiveness of existing best practices and identify new practices that should be widely adopted.

The federal cyber insurance program should be developed under TRIP, borrowing elements from the SAFETY Act given that, much like terrorist attacks, catastrophic cyber incidents affecting the United States will be rare. TRIP should be expanded to cover cyber events and renamed to allow for coverage of all catastrophic cyberattacks—whether they are carried out by terrorists, state actors, or criminals—including cases in which attribution cannot be determined. The new program should require a minimum level of insurance that must be purchased by participating companies and would cover costs up to a limit, beyond which the federal backstop would come into effect. If calibrated correctly, the program should not undermine the private market for either cyber insurance or reinsurance but should allow insurers to take on additional risk that, in aggregate, might otherwise be unmanageable in the event of a truly catastrophic cyber incident with systemic effects. The net effect of the program should be a larger market than would exist without government intervention.

Many companies happily accept indicators but are not motivated to share data on threats targeting their network.

Although TRIP requires the federal government to certify that an incident was terrorism before a company can obtain a payout, cyber incidents should be exempt from this requirement. The U.S. government has a policy of not publicly attributing incidents unless doing so is deemed to be in its national security interests. Future administrations may wish to maintain flexibility on assigning attribution and thus should not be required to point the finger at a particular actor for the purposes of offering insurance coverage.

Firms seeking to obtain insurance under a federally backstopped cyber insurance program should be required to develop a cybersecurity plan based on guidance from the Cybersecurity Framework, the standard for cybersecurity across industries. The Department of Homeland Security should then certify these plans in a process similar to the SAFETY Act today. Certification could also take place by accredited third party providers. Insurers would be responsible for monitoring implementation of the plan. As part of a minimum standard of care, companies should be required to implement protocols that improve the security of the internet as a whole, such as protocols preventing the spoofing of email addresses used in spear-phishing campaigns.

Participating companies should also be required to share data on the threats facing their network through the federal Automated Indicator Sharing (AIS) program. AIS connects participating companies to an anonymous information network to share indicators of malicious activity. As with other areas of cybersecurity, many companies happily accept indicators but are not motivated to share data on threats targeting their network. Requiring participation in information sharing would strengthen collective defense, raise the cost to a potential attacker, and provide a source of data to inform threat calculations made by insurers.

The federally backstopped cyber insurance program should mandate that companies allow full breach investigations, which include on-site gathering of data on why the attack succeeded, to help other companies prevent similar attacks. This function would be similar to that performed by the National Transportation Safety Board (NTSB) for aviation incidents. When an incident occurs, the NTSB establishes the facts of the incident and makes recommendations to prevent similar incidents from occurring. Although regulators typically establish new requirements upon the basis of NTSB recommendations, most air carriers implement recommendations on a voluntary basis. Such a virtuous cycle could happen in cybersecurity if companies covered by a federal cyber insurance program had their incidents investigated by a new NTSB-like entity, which could be run by the private sector and funded by insurance companies.

Critics will contend that after many years in development, the market for cyber insurance is finally taking off and federal intervention is not required. Yet, though growth rates are impressive, the overall size of the market is small compared to the size of potential losses. Moreover, the market on its own is not producing significant reductions in risk. If carefully developed, a federally sponsored cyber insurance program could significantly reduce the economic risk of a cyberattack, allow the insurance market to more accurately price cyber risk, and encourage the adoption of best practices that can make the internet more secure for everyone over time.

Top Stories on CFR

Europe

On the eighty-first anniversary of D-Day, CFR President Michael Froman and senior fellows discuss the Trump administration’s diminished appetite for engagement in European security affairs—even as the Russia-Ukraine war drags on.

Ukraine

The Sanctioning Russia Act would impose history’s highest tariffs and tank the global economy. Congress needs a better approach, one that strengthens existing sanctions and adds new measures the current bill ignores.

China Strategy Initiative

At the Shangri-La dialogue in Singapore last week, U.S. Secretary of Defense Pete Hegseth said that the United States would be expanding its defense partnership with India. His statement was in line with U.S. policy over the last two decades, which, irrespective of the party in power, has sought to cultivate India as a serious defense partner. The U.S.-India defense partnership has come a long way. Beginning in 2001, the United States and India moved from little defense cooperation or coordination to significant gestures that would lay the foundation of the robust defense partnership that exists today—such as India offering access to its facilities after 9/11 to help the United States launch operations in Afghanistan or the 123 Agreement in 2005 that paved the way for civil nuclear cooperation between the two countries. In the United States, there is bipartisan agreement that a strong defense partnership with India is vital for its Indo-Pacific strategy and containing China. In India, too, there is broad political support for its strategic partnership with the United States given its immense wariness about its fractious border relationship with China. Consequently, the U.S.-India bilateral relationship has heavily emphasized security, with even trade tilting toward defense goods. Despite the massive changes to the relationship in the last few years, and both countries’ desire to develop ever-closer defense ties, differences between the United States and India remain. A significant part of this has to do with the differing norms that underpin the defense interests of each country. The following Council on Foreign Relations (CFR) memos by defense experts in three countries are part of a larger CFR project assessing India’s approach to the international order in different areas, and illustrate India’s positions on important defense issues—military operationalization, cooperation in space, and export controls—and how they differ with respect to the United States and its allies. Sameer Lalwani (Washington, DC) argues that the two countries differ in their thinking about deterrence, and that this is evident in three categories crucial to defense: capability, geography, and interoperability. When it comes to increasing material capabilities, for example, India prioritizes domestic economic development, including developing indigenous capabilities (i.e., its domestic defense-industrial sector). With regard to geography, for example, the United States and its Western allies think of crises, such as Ukraine, in terms of global domino effects; India, in contrast, thinks regionally, and confines itself to the effects on its neighborhood and borders (and, as the recent crisis with Pakistan shows, India continues to face threats on its border, widening the geographic divergence with the United States). And India’s commitment to strategic autonomy means the two countries remain far apart on the kind of interoperability required by modern military operations. Yet there is also reason for optimism about the relationship as those differences are largely surmountable. Dimitrios Stroikos (London) argues that India’s space policy has shifted from prioritizing socioeconomic development to pursuing both national security and prestige. While it is party to all five UN space treaties that govern outer space and converges with the United States on many issues in the civil, commercial, and military domains of space, India is careful with regard to some norms. It favors, for example, bilateral initiatives over multilateral, and the inclusion of Global South countries in institutions that it believes to be dominated by the West. Konark Bhandari (New Delhi) argues that India’s stance on export controls is evolving. It has signed three of the four major international export control regimes, but it has to consistently contend with the cost of complying, particularly as the United States is increasingly and unilaterally imposing export control measures both inside and outside of those regimes. When it comes to export controls, India prefers trade agreements with select nations, prizes its strategic autonomy (which includes relations with Russia and China through institutions such as the Shanghai Cooperation Organization and the BRICS), and prioritizes its domestic development. Furthermore, given President Donald Trump’s focus on bilateral trade, the two countries’ differences will need to be worked out if future tech cooperation is to be realized.