Smart Application Form

Cyber One Insurance

[[[["field282","greater_than","0"]],[["show_fields","field157,field158,field222,field217,field224,field226"]],"and"],[[["field301","equal_to","Yes"]],[["show_fields","field300,field303,field307"]],"and"],[[["field352","contains","ISO 27001"],["field352","contains","ISO 27002"],["field352","contains","NIST 800-53"],["field352","contains","NIST 800-171"]],[["hide_fields","field322,field321,field320,field319,field318,field317,field316,field315,field314,field313"]],"or"],[[["field266","equal_to","Yes"]],[["show_fields","field374"]],"and"],[[["field284","greater_than","70"]],[["show_fields","field387"]],"and"],[[["field281","greater_than","99"]],[["hide_fields","field149,field284,field147,field283"]],"and"],[[["field281","greater_than","50"],["field284","greater_than","50"]],[["hide_fields","field147,field283"]],"and"]]
1 Your Business
2 Your Insurance Needs
3 Your Cyber Claims History
4 Your Cybersecurity
5 Your Cyber Attack Surface

Your Business

Your insurance broker name (optionally)
Do you require cover for any related entity?
Number of Employees
Total Turnover
Turnover - EU/EEA/Switzerland
Turnover - USA/Canada
Turnover - The rest of World
What is the turnover share generated or supported by a website?
Which online payment service provider do you use?
Choose your PCI DSS certification level
Date of your last PCI DSS assessment

Your Insurance Needs

Coverage Limit
First-Party Risk Sublimit

[field362] EUR

Business interruption

[field362 * (40/100)] EUR

Cyber Extortion (Ransomware)

[field362 * (20/100)] EUR

Third-Party Risk Sublimit

[field362] EUR

Legal and Regulatory fines and expenses

[field362 * (50/100)] EUR

Cyber Terrorism Sublimit

[field362 * (20/100)] EUR

Executives PR Sublimit

[field362 * (5/100)] EUR

How soon would you start to incur Business Interruption after a critical system is down or not functional?
How long would it take You to fully restore from your backup?
Select your Business Interruption Deductible
Select Deductible (your own participation to the risk)
Policy start date

Your Cyber Claims History

Did you have a Cyber loss in the past 5 years?
When did the claim occur?

Your Cybersecurity

Specify your active and valid security certification:
Please, specify all the security certificates that you currently have
Cybersecurity Services QA
TrueFalse
You use a Security Information and Event Management (SIEM) system.
Cybersecurity Services QA
TrueFalse
You have a Network Intrusion Detection System (NIDS) implemented in your infrastructure.
Cybersecurity Services QA
TrueFalse
You have a Host Intrusion Detection System (HIDS) implemented in your infrastructure.
Cybersecurity Services QA
TrueFalse
You have a Data Leakage/Loss Protection (DLP) solution implemented in your infrastructure.
Cybersecurity Services QA
TrueFalse
You use a Secure email gateway (SEG) or any additional email filtering/security solution.
Cybersecurity Services QA
TrueFalse
You have implemented WEB Application Firewall (WAF) in your infrastructure.
Cybersecurity Services QA
TrueFalse
You have implemented Network Firewall (NF) in your infrastructure.
Cybersecurity Services QA
TrueFalse
You have Anti-virus software on most of your computer endpoints.
Cybersecurity Services QA
TrueFalse
You have Endpoint Detection and Response (EDR) software on most of your computers?
Cybersecurity Questions
TrueFalse
You have a written Policy that addresses information security awareness which is communicated to all employees, including but not limited to legal liability issues, social engineering, phishing and data protection.
Cybersecurity Questions
TrueFalse
You operate commercially licensed and purchased firewalls to prevent, detect and monitor intrusions across your network and regularly apply patches and updates in accordance with the suppliers’ recommendations
Cybersecurity Questions
TrueFalse
You operate licensed anti-virus software across your network and regularly apply patches and updates in accordance with the vendor’s release policy
Cybersecurity Questions
TrueFalse
You encrypt all sensitive and confidential data that is stored on, processed and transmitted from your computer system
Cybersecurity Questions
TrueFalse
You backup your critical data at least weekly to a different location
Cybersecurity Questions
TrueFalse
The backup of Your Critical Data is stored in a secure location with physical access control and allowance for authorized personnel only
Cybersecurity Questions
TrueFalse
You have a formalized data destruction procedure in place for personally identifiable information that is no longer needed by your company
Cybersecurity Questions
TrueFalse
You secure remote access (access control procedures to prevent unauthorized access) to Your network and Your data
Cybersecurity Questions
TrueFalse
You enforce a policy of auditing of managing computer and user accounts
Cybersecurity Questions
TrueFalse
You have a Business Continuity Plan or Disaster Response plan which includes Cyber Incident Response Plan (including but not limited to data breaches, network security breaches, Denial of service attacks and Cyber Extortion)

Your Cyber Attack Surface

Number of employees using the corporate network
Number of home working employees (using other networks)
Number of server nodes (On premise and Cloud)
Number of root domains
Number of sub-domains
Number of VPN clients
Number of email aliases
Number of WEB and Desktop applications
Degree of WEB and Desktop apps centralization
Number of Mobile applications

WARNING! Because your revenue stems mostly from USA/Canada your request will be redirected to our underwriter. You can get in touch with your underwriter at [email protected]

keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right

Get in touch

We are ready to assist you in any situation and unfamiliar environment. You can simply call us on our free 24-hours phones.

Scroll to Top