Cyber Insurance Statistics [2026]: Market, Claims & Costs

25 min readBy Nathan House
Cyber Insurance Statistics 2026

The global cyber insurance market reached $16.6 billion in 2026 (Swiss Re), yet 41% of applications are denied on first submission (Marsh McLennan). Cyber insurance premiums dropped 11% in 2025 (Lockton) after a -22% decline from the 2022 peak — but claims surged 40% and S&P forecasts 15-20% premium increases in 2026. If you need the latest cyber insurance statistics to evaluate coverage, benchmark premiums, or understand what insurers require, this is the most comprehensive and cross-referenced source available.

You'll find 75+ cyber insurance statistics across 17 sections — from market size and premium trends to claims data, denial rates, coverage gaps, notable case studies, insurer comparisons, and regional breakdowns — sourced from Munich Re, Swiss Re, NAIC, Coalition, S&P Global, Howden, Marsh McLennan, Beazley, and more. Each section includes original derived analysis cross-referencing multiple reports to surface insights you won't find in any single source.

Key Cyber Insurance Statistics at a Glance

  • $16.6 billion — global cyber insurance market size in 2026 (Swiss Re)
  • 62% overall adoption rate, up from 49% in 2024 (industry surveys)
  • $7.075 billion — US direct written premiums, the first-ever YoY decline of -2.3% (NAIC)
  • ~50,000 US cyber insurance claims in 2024, up 40% year-over-year (NAIC)
  • 41% of applications denied on first submission (Marsh McLennan)
  • 60% of claims come from business email compromise and funds transfer fraud (Coalition)
  • 9.6% of claims are ransomware, but they drive 91% of incurred losses (Coalition)
  • 80% of insurers require MFA; 65% expect EDR deployment
  • >70% of major EU businesses remain uninsured (Howden)
  • $1.4 billion — largest cyber insurance claim in history (Merck NotPetya, settled 2024)
  • 3.5x — US premium growth from $2.02B (2018) to $7.08B (2024) (NAIC)
  • +133% — peak rate increase in Q4 2021 (Marsh), now declined -22% from peak
  • ~30% — top 5 cyber insurers' combined market share (BeInsure)
  • $32B-$85B — projected market size by 2030, depending on source

Last updated: March 2026

$16.6B
Global market size
62%
Adoption rate
41%
Application denial rate
9.6%
Of claims = 91% of losses

📈 Cyber Insurance Market Size and Growth Statistics

$16.6B
Global Cyber Insurance Market
Source: Swiss Re (2026)

The global cyber insurance market grew from $15.3 billion in 2024 (Munich Re) to an estimated $16.6 billion in 2026 (Swiss Re). S&P Global Ratings forecasts $23 billion in global premiums by 2026. Looking further out, 2030 estimates range from $32.19 billion (MarketsandMarkets, 14.2% CAGR) to $84.62 billion (aggressive forecasts, 26.1% CAGR). Munich Re projects the market will double by 2030 at over 10% annual growth.

Rates have softened considerably since the hard market peak of 2022. Howden reports a -22% cumulative rate decline from the 2022 peak, with annual premium growth slowing from 40% to just 6%. New market entrants, improved loss ratios, and increased competition drove this correction. However, the softening cycle may be ending: S&P forecasts 15-20% premium increases in 2026 as claims surge and catastrophic losses return.

The market's growth trajectory is remarkable by insurance standards. No other commercial insurance line has sustained double-digit growth rates for this long. For comparison, the global property insurance market grows at 3-5% annually. Cyber insurance is growing 3-5x faster because the underlying risk — cyberattacks — is also growing exponentially. Every new data privacy regulation, every ransomware headline, and every supply chain breach creates demand that didn't exist five years ago.

The wide range of 2030 forecasts ($32B to $85B) reflects fundamental uncertainty about two key variables: SMB adoption velocity and the frequency of catastrophic systemic events. If SMB adoption accelerates from 10-20% to 40-50% (driven by regulatory mandates and vendor contract requirements), the market could approach the higher end of forecasts. If a major systemic event occurs — a cloud provider outage, a widely-deployed software supply chain attack, or an AI-enabled mass attack — it could either accelerate adoption (as fear drives demand) or contract the market (as insurers withdraw capacity). The insured base is still heavily skewed toward large enterprises and North America, leaving enormous untapped demand in SMB and international segments.

Finding Value Source
Global cyber insurance market (2024) $15.3B Munich Re
Global cyber insurance market (2025) $16.6B Swiss Re
S&P Global premium forecast (2026) $23B S&P Global Ratings
Conservative 2030 forecast (MarketsandMarkets) $32.19B MarketsandMarkets
Munich Re annual growth rate forecast to 2030 >10% Munich Re
Rate decline from 2022 peak -22% Howden
Premium growth rate (down from 40%) 6% Howden

Nathan House's Analysis: Market Doubles in Six Years

The cyber insurance market grew from $15.3 billion (Munich Re, 2024) to a projected $32.19 billion by 2030 (MarketsandMarkets) — a 2.1x increase in six years. But that's the conservative estimate. Aggressive forecasts place the 2030 market at $84.62 billion (26.1% CAGR). The divergence reflects uncertainty about SMB adoption rates and whether regulatory pressure (GDPR, NIS2, CIRCIA) will force businesses into coverage. Either way, the market is growing faster than virtually any other insurance line.

🇺🇸 US Cyber Insurance Premium Statistics

US Direct Written Premiums
$7.075B
-2.3%

US direct written premiums totalled $7.075 billion in 2024 — the first-ever year-over-year decline at -2.3% (NAIC / AM Best). The US represents approximately 55% of the global cyber insurance market. The loss ratio rose 7 points to 49% (NAIC), still profitable but trending upward. The combined loss and defence cost containment ratio came in at 47% (Fitch Ratings), indicating the market remains well within profitable territory.

Claims count surged to approximately 50,000, a 40% year-over-year increase (NAIC). Lockton reports average premiums dropped 11% in 2025. Despite the softening market, S&P Global forecasts a 15-20% premium increase in 2026 as the claims surge erodes profitability margins. The message is clear: businesses renewing policies in 2026 should expect higher premiums after two years of rate declines.

The US market's first-ever premium decline deserves context. It does not signal a shrinking market — it reflects rate adequacy corrections after the dramatic 50% premium surge in 2022. Total premium volume is still up significantly from 2020 levels. New policies are being written at lower rates per unit of coverage, but the total insured base continues to expand. For buyers, the 2025 renewal cycle represents a window of opportunity: rates are at their lowest point since 2021, and that window is closing as S&P projects a return to rate increases in 2026.

Finding Value Source
US direct written premiums (2024, -2.3% YoY) $7.075B NAIC / AM Best
US cyber insurance premiums (prior) $7.2B NAIC / Fitch Ratings
US loss ratio (2024) 49% NAIC
US combined loss + DCC ratio 47% Fitch Ratings
US claims count (2024, +40% YoY) ~50,000 NAIC
Average premium drop (Lockton 2025) -11% Lockton
S&P 2026 premium increase forecast +15-20% S&P Global

Nathan House's Analysis: Premium Revenue vs Claim Costs

$7.075 billion in US premiums divided by ~50,000 claims = approximately $141,500 collected per claim. With the average loss per claim at $115,000 (Coalition), insurers are collecting roughly 23% more per claim than they pay out — before operational expenses. That margin explains the industry's $9 billion cumulative profit between 2022-2024, but the +40% surge in claims count is the figure insurers are watching.

🏢 Cyber Insurance Adoption Rates by Company Size

Overall Adoption Rate
62 /100

Overall cyber insurance adoption reached 62% in 2026, up from 49% in 2024 (industry surveys). But that headline figure masks a dramatic disparity by company size. Large corporates lead at 60-70% adoption (Swiss Re), mid-market firms sit at 40-50%, and SMEs trail at just 10-20%. 75% of organisations with $5.5 billion+ revenue carry cyber insurance, compared with only 25% of organisations under $250 million (SentinelOne / Industry Reports).

The UK presents an interesting contrast: 62% of small businesses, 65% of medium businesses, but only 53% of large businesses have cyber insurance — likely reflecting mandatory requirements from large-enterprise self-insurance programmes. 65% of SMBs plan to increase their cyber insurance spend within the next two years, signalling that the adoption gap is narrowing.

Adoption is driven by three forces: regulatory requirements, board-level awareness, and breach experience. Organisations that have experienced a cyber incident are 3x more likely to purchase or upgrade cyber insurance. Board directors are increasingly asking about cyber insurance as part of their fiduciary duty. And regulatory frameworks like NIS2 (EU), CIRCIA (US), and the UK's proposed cyber resilience framework are making coverage a de facto requirement for regulated entities. The 49% to 62% adoption jump in a single year (2024 to 2026) is the largest annual increase on record.

Industry-specific adoption patterns reveal interesting dynamics. Healthcare organisations have the highest adoption rate among mid-market firms, driven by HIPAA requirements and the industry's $11.2 million average breach cost (IBM). Financial services firms have mature adoption, partly because regulatory frameworks (SOX, GLBA, PCI-DSS) effectively mandate coverage. Technology companies increasingly require cyber insurance as a contractual condition for enterprise clients. Manufacturing, despite accounting for 33% of all cyber claims (Allianz), has lower adoption rates among SMEs — a mismatch that makes manufacturing one of the most underinsured sectors relative to its risk profile. The convergence of operational technology (OT) risk, supply chain exposure, and high-value intellectual property makes manufacturing arguably the sector most in need of expanded cyber insurance coverage.

The adoption gap between large enterprises and SMBs creates a structural vulnerability in the broader business ecosystem. Large enterprises may have comprehensive cyber insurance, but their supply chains include thousands of smaller, uninsured vendors. When an uninsured SMB in a supply chain is breached, the costs cascade upward to the large enterprise through operational disruptions, data exposure, and regulatory liability. This interconnected risk is driving a trend where large enterprises require their vendors to carry minimum levels of cyber insurance — a contractual mechanism that could accelerate SMB adoption faster than regulatory mandates alone.

Finding Value Source
Overall adoption rate (2025) 62% Industry surveys
Large corporate adoption 60-70% Swiss Re
Mid-market adoption 40-50% Swiss Re
SME adoption 10-20% Swiss Re
Large orgs ($5.5B+ revenue) with insurance 75% SentinelOne / Industry Reports
Small orgs (<$250M revenue) with insurance 25% SentinelOne / Industry Reports
SMBs planning to increase spend (next 2 years) 65% Industry surveys

Large Enterprises

  • 60-70% adoption rate (Swiss Re)
  • 75% of $5.5B+ orgs insured (SentinelOne)
  • Comprehensive policies with endorsements
  • Dedicated risk management teams

Small & Medium Businesses

  • 10-20% adoption rate (Swiss Re)
  • 25% of <$250M orgs insured (SentinelOne)
  • Basic policies, often underinsured
  • 88% of SMB breaches involve ransomware (Verizon)

Nathan House's Analysis: The 8x Coverage Disparity

Large corporations have 60-70% cyber insurance adoption (Swiss Re). SMEs have 10-20%. That's up to an 8x coverage disparity. Yet small businesses face higher ransomware rates — 88% of SMB breaches involve ransomware (Verizon DBIR 2025). The organisations most likely to be devastated by an attack are the least likely to be insured. With 65% of SMBs planning to increase spending, this gap should narrow, but it remains the market's biggest structural vulnerability.

💰 How Much Does Cyber Insurance Cost?

$134/mo
SMB Average
~$1,740/year
$148/mo
IT Businesses
Highest by sector
$58/mo
Finance Sector
Lower risk profile

Small businesses pay an average of $134 per month ($1,740 per year) for cyber insurance. 38% pay less than $100 per month, while 33% pay $100-$200 per month. Annual premiums range from $400 for micro-businesses with minimal coverage to $8,000+ for comprehensive mid-market policies. IT businesses pay the highest average at $148 per month, reflecting their higher data exposure. Finance sector premiums average $58 per month, partly due to mature existing security controls that reduce risk profiles.

Premium pricing depends on company size, industry, annual revenue, claims history, and security controls in place. Organisations with MFA, EDR, and immutable backups typically pay 20-30% less than those without. Healthcare and manufacturing face the highest claim costs, which translates into higher premium rates. Manufacturing accounts for 33% of all cyber insurance claims (Allianz), the highest of any sector.

The premium-to-breach-cost ratio provides important context for evaluating whether cyber insurance is worth the investment. With an average breach cost of $4.88 million (IBM) and average SMB premiums of $1,740 per year, every dollar spent on cyber insurance protects approximately $2,800 in breach exposure. For larger organisations, the calculus is even more favourable: a $50,000 annual premium covering a $200 million policy provides exceptional leverage against the nine-figure losses demonstrated in the MGM Resorts and Merck cases. The challenge is ensuring your coverage terms actually pay out — as the Norsk Hydro case showed, the gap between policy limits and actual payouts can be enormous.

Premium costs have fluctuated dramatically with market conditions. During the 2021-2022 hard market, some organisations saw renewal increases of 100-300%. The 2023-2025 softening cycle has brought premiums back down, with Lockton reporting an average -11% drop in 2025. However, S&P's forecast of 15-20% increases in 2026 means the current pricing window is closing. Organisations should consider multi-year policies if their insurer offers them, as locking in current rates could save 15-30% compared to 2026-2027 renewal pricing. Claims history has the largest single impact on individual premiums: organisations with one or more previous claims face 25-50% higher rates than comparable businesses with clean records.

Finding Value Source
Average loss per claim $115,000 Coalition
Average ransomware claim severity $1.18M Coalition
Manufacturing share of claims (Allianz) 33% Allianz

Cyber Insurance Premium Estimator

Estimate your annual cyber insurance premium based on company size, industry, and revenue. Based on Coalition, NAIC, and industry data.

Estimated Annual Premium
$1,740
~$145/month | Avg breach cost: $4.88M (IBM)
Premium-to-breach ratio: every $1 in premium protects ~$2,800 in breach exposure
Estimate based on Coalition, NAIC, and industry data. Actual premiums vary by insurer, controls, and claims history.

📄 Cyber Insurance Claims Statistics

60%
Of Claims from BEC + Funds Transfer Fraud
Source: Coalition Cyber Claims Report

Business email compromise (BEC) and funds transfer fraud (FTF) account for 60% of all cyber insurance claims (Coalition). 29% of BEC events lead to funds transfer fraud. The average loss per claim is $115,000 (Coalition). BEC severity rose 23% year-over-year, driven by increasingly sophisticated social engineering tactics and AI-generated phishing.

Large claims exceeding EUR 1 million now represent 15% of all claims, up from just 6% previously. Coalition recovered $31 million through clawback efforts, averaging $278,000 per successful recovery — demonstrating that rapid incident response can recover a significant portion of stolen funds. The US alone saw approximately 50,000 cyber insurance claims in 2024, a 40% increase year-over-year (NAIC).

The claims landscape is shifting. While BEC and funds transfer fraud dominate by volume, the average severity of ransomware claims continues to climb. Coalition data shows ransomware claim severity rose 17% year-over-year to $1.18 million. The combination of rising claim volumes (+40%) and increasing severity per claim is the dual pressure point for insurers. Organisations filing claims should note that response speed matters: Coalition's $278,000 average clawback success rate applies only when incidents are reported within hours, not days.

Claims by Industry Sector

Manufacturing leads all sectors with 33% of cyber insurance claims (Allianz), the highest of any industry. This reflects manufacturing's reliance on operational technology (OT) systems, legacy infrastructure, and the high cost of production downtime. Healthcare follows as the second-highest cost sector, with an average breach cost of $11.2 million (IBM) — 2.3x the global average. Financial services face the highest regulatory fine exposure, with GDPR penalties reaching 4% of global revenue. The technology sector, despite having relatively mature security controls, faces the highest premium rates ($148/month average) due to the volume and sensitivity of data processed.

Coalition reports that 52% of its policyholders' reported matters are handled without requiring out-of-pocket payments, with claims frequency increasing 13% year-over-year and severity increasing 10% YoY to an average loss amount of $100,000. This data point underscores a critical distinction between specialist and generalist insurers: Coalition's active monitoring model catches and resolves incidents before they become expensive claims, while traditional insurers only engage after the damage is done. Organisations evaluating insurers should compare not just premium costs and limits, but also pre-breach services and claims resolution rates.

Finding Value Source
BEC + funds transfer fraud share of claims 60% Coalition
Average loss per claim $115,000 Coalition
Average ransomware claim severity (+17% YoY) $1.18M Coalition
US claims count (2024, +40% YoY) ~50,000 NAIC
Average data breach cost (IBM 2024) $4.88M IBM Cost of a Data Breach Report 2024

🔒 Ransomware and Cyber Insurance

9.6%
Claims Share
Of all claims
91%
Loss Share
Of incurred losses
$1.18M
Avg Damages
+17% YoY (Coalition)

The relationship between ransomware cyber insurance claims is starkly disproportionate. Ransomware represents just 9.6% of cyber insurance claims but drives 91% of incurred losses (Coalition). That ratio makes ransomware the single most consequential risk for cyber insurers. Average ransomware damages reached $1.18 million in 2026, a 17% year-over-year increase (Coalition). Ransom demands surged 47% year-over-year, with threat actors demanding larger sums even as organisations increasingly refuse to pay.

A record 86% of affected businesses now refuse to pay ransom demands (Coalition). The shift from encryption-only attacks to data theft and extortion has changed the insurance calculus: even organisations with robust backups face potential exposure from stolen data. The UK is proposing a public sector ransom payment ban, and CISA will require mandatory reporting for over 300,000 entities starting in 2026. These regulatory shifts are reshaping how insurers assess and price ransomware risk.

For insurers, the ransomware problem is existential. A single large ransomware event can wipe out an entire year's premiums for a mid-tier carrier. This concentration risk explains why re-insurers are imposing stricter terms and why primary carriers are mandating specific security controls. The +47% surge in ransom demands alongside a +17% increase in severity means the per-incident cost trajectory is still climbing — even as the overall payment rate declines. Insurers are effectively betting that better security controls will reduce frequency enough to offset rising per-incident severity.

The evolution of ransomware tactics has direct implications for insurance coverage. Traditional ransomware encrypted data and demanded payment for a decryption key — a risk that could be mitigated with offline backups. Modern double-extortion and triple-extortion attacks steal data before encrypting it, then threaten to publish the stolen data if the ransom isn't paid. Even organisations with perfect backup infrastructure face potential losses from data exposure: regulatory fines (GDPR can reach 4% of global revenue), class-action lawsuits from affected individuals, reputational damage, and business relationship losses. This means the insurance coverage needed has expanded beyond simple "data restoration" to include regulatory defence costs, customer notification expenses, credit monitoring services, and public relations crisis management. Policyholders should verify that their coverage addresses all stages of a multi-extortion attack, not just the encryption component.

The CNA Financial case ($40M ransom in 2021) illustrated another dimension of ransomware insurance risk: what happens when the insurer itself is the victim? CNA's attack raised fundamental questions about systemic risk in the cyber insurance industry. If a major insurer's systems are compromised, it could disrupt claims processing for thousands of policyholders simultaneously. This self-referential risk — cyber attacks on the institutions that insure against cyber attacks — is unique to the cyber insurance line and remains a concern for regulators and reinsurers.

Finding Value Source
Ransomware: 9.6% of claims but 91% of losses 9.6% claims / 91% losses Coalition
Average ransomware damages (+17% YoY) $1.18M Coalition
Ransom demand surge (+47% YoY) +47% Coalition
Record businesses refusing to pay ransom 86% Coalition

Nathan House's Analysis: The Ransomware Disproportionality Problem

Ransomware accounts for just 9.6% of cyber insurance claims but 91% of incurred losses (Coalition). That's a 9.5x disproportionate impact. For every 10 claims an insurer processes, roughly 1 involves ransomware — but that single claim drives 9 out of 10 dollars paid out. This ratio explains why insurers are imposing stricter security controls: they're not trying to prevent most claims, they're trying to prevent the catastrophic ones.

📑 Notable Cyber Insurance Claims & Case Studies

$1.4B
Largest Cyber Insurance Claim (Merck NotPetya)
Source: Insurance Journal / Bloomberg Law (2024)

The history of cyber insurance is defined by a handful of landmark claims that reshaped policy language, tested war exclusions in court, and exposed the gap between coverage expectations and payout reality. These case studies are essential reading for any organisation evaluating cyber insurance, because the legal precedents (and non-precedents) from these cases directly affect what your policy will and won't cover today.

Largest Cyber Insurance Claims by Amount

🏥 Merck (NotPetya)
$1.4B
🏰 MGM Resorts
$100M+
🍫 Mondelez
$100M+
Norsk Hydro
$71M
🎰 CNA Financial
$40M
🎲 Caesars
$15M
Colonial Pipeline
$4.4M

Case Study: Merck & NotPetya ($1.4 Billion)

In 2017, the NotPetya malware — attributed to Russian military intelligence (GRU) — spread globally via a Ukrainian tax software update. Merck & Co., the pharmaceutical giant, was among the hardest hit, estimating $1.4 billion in total damages including destroyed computer systems, disrupted manufacturing, and lost revenue. Merck filed claims under its "all risk" property insurance policies. Eight insurers denied the claims, citing a "hostile or warlike action" exclusion.

The New Jersey trial court ruled in 2022 that the war exclusion did not apply, finding that insurers had not updated exclusion language to clearly address cyberattacks. The appellate court upheld this ruling in May 2023. Before the NJ Supreme Court could hear the case, Merck and its insurers reached a confidential settlement in January 2024. While the exact terms remain undisclosed, approximately $700 million of the total claim was in dispute. The case established that traditional war exclusions — written for armed conflict — cannot simply be applied to cyber events without explicit policy language.

Case Study: Mondelez vs Zurich ($100M+)

Mondelez International (maker of Oreo, Cadbury) suffered over $100 million in NotPetya damages and filed a claim with Zurich American Insurance. Zurich denied the claim citing the same war exclusion. After a multi-year legal battle approaching trial, the parties settled in November 2022. The settlement terms are confidential, and critically, no legal precedent was set. However, Mondelez's position had strengthened considerably after the Merck trial court ruling earlier that year.

Case Study: MGM Resorts ($100M+, 2023)

In September 2023, the Scattered Spider hacking group (affiliated with ALPHV/BlackCat) targeted MGM Resorts through a social engineering attack on the IT help desk. A phone call impersonating an employee was all it took. The attack shut down slot machines, ATMs, hotel key systems, and the company's website for days. MGM disclosed a $100 million hit to Q3 2023 results. The company carried a $200 million cyber insurance policy covering business interruption and ransomware costs (JMP Securities). Unlike Caesars, MGM refused to pay the ransom. The case demonstrates how a single social engineering phone call can trigger nine-figure insurance claims.

Case Study: Norsk Hydro ($71M Cost, $3.6M Insurance Payout)

Norwegian aluminium manufacturer Norsk Hydro was hit by the LockerGoga ransomware in March 2019, forcing the company to switch global operations to manual processes. Total damages reached $60-75 million (Insurance Journal). Norsk Hydro refused to pay the ransom. Despite carrying a "solid cyber risk insurance policy" with AIG as lead insurer, the company received only $3.6 million in insurance payouts — approximately 5% of total losses. The case is a cautionary tale about the gap between perceived coverage and actual payouts. Policy sub-limits, deductibles, and coverage exclusions dramatically reduced the effective payout.

Case Study: CNA Financial ($40M Ransom)

CNA Financial — itself one of the largest commercial insurance companies in the US — paid a $40 million ransom in March 2021 after being hit by the Phoenix CryptoLocker ransomware. At the time, this was the largest publicly confirmed ransom payment. The irony of an insurance company paying the largest known ransom was not lost on the industry. The incident underscored that even organisations with deep security expertise and comprehensive coverage are vulnerable. CNA's attackers exploited a known vulnerability and moved laterally through the network before deploying ransomware.

Case Study: Colonial Pipeline ($4.4M Ransom, Partial Recovery)

The May 2021 Colonial Pipeline attack by DarkSide ransomware shut down the largest fuel pipeline in the US, triggering fuel shortages across the East Coast. Colonial paid a $4.4 million ransom in cryptocurrency. The US Department of Justice later recovered approximately $2.3 million of the payment by tracing and seizing Bitcoin from a DarkSide-affiliated wallet. The attack was a watershed moment that prompted the Biden administration's executive order on cybersecurity and CISA's mandatory incident reporting requirements (CIRCIA). It demonstrated that critical infrastructure attacks have consequences far beyond the ransom amount.

Case Study: MOVEit / Progress Software (2023)

The Cl0p ransomware group exploited a zero-day vulnerability in Progress Software's MOVEit file transfer tool in May-June 2023, compromising over 2,500 organisations and exposing data on more than 90 million individuals. While Progress Software's direct costs were modest — $1.5 million net of $3.7 million in insurance recoveries — the estimated total cost across all affected organisations reached $12.15 billion (Emsisoft). The incident spawned 100+ class-action lawsuits and insurance subrogation claims filed against Progress. MOVEit demonstrated how a single vendor vulnerability can create cascading insurance claims across thousands of policyholders simultaneously — a systemic risk that cyber insurers had long warned about.

Timeline of Landmark Cyber Insurance Events

June 2017
NotPetya spreads globally
Russian GRU-linked malware causes $10B+ in global damages. Merck, Mondelez, FedEx, and Maersk among hardest hit with multi-billion dollar combined losses. War exclusion disputes begin.
March 2019
Norsk Hydro LockerGoga attack
$71M total cost, only $3.6M insurance payout. Exposes massive gap between coverage expectations and actual payouts under sub-limits.
2021
Ransomware crisis year
Colonial Pipeline ($4.4M ransom), CNA Financial ($40M ransom), JBS ($11M ransom). Cyber insurance rates spike +133% (Marsh). Hard market begins.
November 2022
Mondelez & Zurich settle
Mondelez NotPetya claim settled confidentially. No legal precedent set, but Lloyd's mandates war exclusions from April 2023.
September 2023
MGM & Caesars attacks
Scattered Spider hits both casino giants via social engineering. MGM: nine-figure loss, refused ransom. Caesars: paid $15M. Demonstrates social engineering as top attack vector.
January 2024
Merck NotPetya settlement
Merck's record claim settled before NJ Supreme Court hearing. Courts had ruled war exclusions did not apply to cyberattacks under traditional policy language.

Case Study: Caesars Entertainment ($15M Ransom, 2023)

Just weeks before the MGM attack in September 2023, the same Scattered Spider group compromised Caesars Entertainment using an identical social engineering technique — convincing a third-party IT vendor to provide login credentials by impersonating a Caesars employee. Caesars faced a $30 million ransom demand and ultimately paid $15 million. Unlike MGM, Caesars' systems remained largely operational throughout the incident, and the company stated it was "partially covered" by cyber insurance. The contrasting outcomes between Caesars (paid ransom, minimal disruption, partial coverage) and MGM (refused ransom, nine-figure loss, higher coverage limit) offer a natural experiment in ransom payment decision-making.

Insurance Impact of These Cases

Collectively, these case studies have reshaped the cyber insurance market in several measurable ways. The NotPetya cases (Merck, Mondelez) directly led to Lloyd's war exclusion mandate from April 2023 — the most significant policy language change in cyber insurance history. The 2021 ransomware crisis (Colonial Pipeline, CNA Financial, JBS) triggered the hard market that saw rates increase by 133% in a single quarter. The MGM and Caesars incidents accelerated insurer requirements for social engineering awareness training and privileged access management. And MOVEit forced reinsurers to impose stricter systemic risk and aggregation clauses, which limits the capacity primary carriers can offer for supply chain-dependent risks.

The Norsk Hydro case ($71M cost, $3.6M payout) remains the most cited cautionary tale in cyber insurance. It illustrates three critical gaps: sub-limit inadequacy (policy sub-limits were far below actual loss), business interruption exclusions (manufacturing downtime costs often exceed direct remediation costs), and the slow pace of claims processing (the payout represented only early-stage recovery costs, with the full claims process taking years). For organisations evaluating their cyber insurance coverage, the Norsk Hydro case establishes a simple test: if your total loss were $70 million, how much would your policy actually pay?

Key Lessons from Cyber Insurance Case Studies

  1. War exclusions are the biggest coverage risk. Merck and Mondelez both won or settled favourably, but Lloyd's mandate means post-2023 policies explicitly exclude nation-state attacks. Check your war exclusion language at every renewal.
  2. Sub-limits can render coverage inadequate. Norsk Hydro's 5% recovery rate is the most extreme example. Always verify sub-limits for ransomware, business interruption, and data restoration.
  3. Social engineering is now the top entry vector for major claims. MGM and Caesars were both compromised through phone calls to IT help desks. Insurers now evaluate social engineering controls as part of underwriting.
  4. Systemic risk is real. MOVEit's $12.15B estimated total cost across thousands of organisations demonstrates how a single vendor vulnerability creates correlated claims. Insurers are increasingly asking about supply chain dependencies.
  5. Ransom payment decisions have strategic implications. CNA paid $40M and was criticised. Colonial paid $4.4M and DOJ recovered $2.3M. MGM refused to pay and absorbed nine-figure losses. There is no universally correct answer, but your policy terms and incident response plan should address the decision framework in advance.
  6. Even insurance companies get hit. CNA Financial's $40M ransom payment proved that no organisation, regardless of expertise, is immune. This event accelerated the industry-wide push for mandatory MFA and EDR requirements.
  7. The gap between perceived and actual coverage can be enormous. From Norsk Hydro's 5% recovery rate to MGM's policy covering only a fraction of its total damages, the range of insurance effectiveness varies wildly. The single most important action is to read and understand your policy exclusions, sub-limits, and notification requirements before you need to file a claim.
Finding Value Source
Merck NotPetya claim (settled Jan 2024) $1.4B Insurance Journal
Mondelez NotPetya claim (settled Nov 2022) $100M+ CSO Online
MGM Resorts attack cost (Q3 2023) $100M The Record / Recorded Future
Norsk Hydro total cost (insurance paid $3.6M) $71M Insurance Journal
CNA Financial ransom payment (2021) $40M Insurance Journal
Caesars Entertainment ransom (2023) $15M CNBC
Colonial Pipeline ransom (DOJ recovered $2.3M) $4.4M Insurance Journal
MOVEit estimated total cost (all orgs) $12.15B Emsisoft

Nathan House's Analysis: The $1.5 Billion War Exclusion Lesson

Merck ($1.4B) and Mondelez ($100M+) both fought their insurers over war exclusions triggered by the 2017 NotPetya attack. Both settled — meaning no binding legal precedent was established. Meanwhile, Lloyd's of London mandated war exclusions across all cyber policies from April 2023. The takeaway: even if courts have sided with policyholders so far, the insurance industry has rewritten the rules. Every cyber policy issued after April 2023 explicitly excludes nation-state attacks. If your organisation is targeted by a state-affiliated threat group (and attribution is murky for most APT campaigns), your claim may be denied. Review your war exclusion clause before your next renewal.

Cyber Insurance Claim Denial Statistics

Application Denial Rate 41% / 100%
41%

Between 25-40% of cyber insurance claims are denied. 41% of applications are rejected on first submission (Marsh McLennan). The denial reasons break down clearly: insufficient documentation accounts for 44% of denials, missing MFA causes 37%, legacy systems contribute to 22%, and late reporting beyond the 24-72 hour window drives 17%.

These aren't random rejections. Insurers are enforcing specific, measurable requirements and denying claims when organisations can't demonstrate compliance at the time of the incident — not at the time of application. Having MFA enabled when you applied but disabled when the breach occurred will result in denial. Documentation must be current, tested, and verifiable.

The timing dimension of claim denials deserves emphasis. Many organisations successfully pass the initial underwriting process by demonstrating security controls at application time, then allow those controls to degrade over the policy period. Underwriters are increasingly conducting mid-term audits and using continuous monitoring (especially among InsurTech carriers like Coalition) to verify that controls remain in place throughout the policy period. If your organisation deploys MFA during the application but has coverage gaps in the deployment (some accounts unprotected, MFA disabled for convenience), the insurer may deny a claim that enters through the unprotected gap. The standard is not "did you have MFA somewhere?" but "was MFA consistently enforced across all relevant access points at the time of the incident?"

The late-reporting denial category (17% of denials) is often the most avoidable and the most costly. Most policies require incident notification within 24-72 hours. Many organisations delay reporting while they investigate internally, hoping to contain the incident before involving the insurer. This is a critical mistake. Insurers require early notification precisely because their incident response teams are most effective in the first hours — Coalition's $278,000 average clawback success rate only applies when incidents are reported immediately. Late reporting not only risks denial but also forfeits the insurer's response resources that could have mitigated the loss.

Finding Value Source
Applications denied on first submission 41% Marsh McLennan
Overall claim denial rate range 25-40% Multiple sources
Denials caused by missing MFA 37% Industry data

Accepted Claims

  • Average payout: $115,000 (Coalition)
  • MFA, EDR, backups documented
  • Incident reported within 24-72 hours
  • Ransom recovery: $278K avg clawback (Coalition)

Denied Claims

  • 41% denied on first submission (Marsh)
  • 37% denied for missing MFA
  • 44% denied for lack of documentation
  • 17% denied for late reporting (>72hrs)

Nathan House's Analysis: The $47,000 Denial Risk

41% of cyber insurance applications are denied on first submission (Marsh McLennan). The average claim is worth $115,000 (Coalition). That means every unvalidated application carries approximately $47,000 in denial risk. The fix is straightforward: implement MFA (37% of denials), document your controls (44% of denials), and report incidents within 24-72 hours (17% of denials). The cost of implementing MFA organisation-wide is a fraction of one denied claim.

What Cyber Insurers Require (Security Controls)

Understanding cyber insurance requirements is critical to avoiding claim denials. 80% of cyber insurers require multi-factor authentication — and SMS-based MFA is no longer accepted. Insurers now mandate app-based authenticators (Microsoft Authenticator, Google Authenticator) or hardware tokens (YubiKey). 65% of insurers expect endpoint detection and response (EDR) deployment across all endpoints. Immutable or isolated backups are effectively mandatory, with most policies requiring proof of air-gapped or offline backup infrastructure.

Underwriting has shifted from self-reported checklists to proof-based verification. Insurers now demand screenshots of security configurations, EDR deployment reports, and MFA coverage dashboards. Verbal attestations and checkbox forms are no longer sufficient. EDR deployment typically takes 2-4 weeks and costs $5-$15 per device per month — a fraction of the premium savings from improved risk posture and reduced denial risk.

The shift to evidence-based underwriting reflects a broader industry lesson learned from 2020-2021, when self-reported security postures proved unreliable. Organisations that attested to having MFA but had it deployed only partially saw claims denied when breaches occurred through unprotected accounts. Today, insurers increasingly conduct active security scans of applicant infrastructure, review third-party risk ratings, and may require penetration test results. The cost of compliance is real but modest: MFA ($3-$10/user/month), EDR ($5-$15/device/month), and immutable backups ($2-$8/device/month) collectively cost less than a single denied claim.

Emerging requirements reflect evolving threat landscapes. Following the MGM and Caesars social engineering attacks (2023), insurers are increasingly evaluating help desk verification procedures and privileged access management (PAM) controls. The MOVEit incident prompted questions about vendor risk management and third-party assessment programmes. And the rise of AI-generated phishing has led some insurers to mandate advanced email security controls beyond basic spam filtering, including AI-powered email threat detection, DMARC enforcement, and regular phishing simulation testing. Organisations should proactively implement these controls not only for insurance eligibility but because they represent security fundamentals that materially reduce breach risk — the data consistently shows that organisations with strong security controls experience lower claims frequency and severity, which translates directly into premium savings.

The economics of security control investment are overwhelmingly favourable. A 100-person organisation implementing MFA ($6,000-$12,000/year), EDR ($6,000-$18,000/year), and immutable backups ($2,400-$9,600/year) invests approximately $14,400-$39,600 annually. Against an average claim value of $115,000 (Coalition) and a 41% denial rate for non-compliant organisations (Marsh), the expected value of implementing these controls exceeds $47,000 per potential claim avoided. Additionally, organisations with all three controls typically receive 20-30% premium discounts, further offsetting the investment cost. The ROI is clear: security controls pay for themselves through both reduced premiums and increased claims acceptance rates.

Finding Value Source
Insurers requiring MFA ~80% Industry surveys
Insurers expecting EDR 65% Industry surveys
Applications denied (first submission) 41% Marsh McLennan
Denials from missing MFA 37% Industry data

Nathan House's Analysis: MFA — The $42,550 Security Control

37% of cyber insurance denials stem from missing MFA. With the average claim at $115,000 (Coalition), preventing a denial by deploying MFA saves approximately $42,550 per claim. MFA implementation costs $3-$10 per user per month for app-based solutions. For a 100-person company, that's $3,600-$12,000 per year — a fraction of one denied claim. MFA is the single highest-ROI security control for both insurance eligibility and breach prevention.

Cyber Insurance Readiness Checker

Answer these questions to assess your readiness for cyber insurance approval. Based on insurer requirements from Munich Re, Marsh McLennan, and Coalition data.

Readiness Score
0%
Answer the questions above to see your readiness score
Based on common insurer requirements. Missing MFA, EDR, or backups significantly increases denial risk.

Cyber Insurance Coverage Gaps and Exclusions

Cyber insurance policies contain significant exclusions that many policyholders discover only after filing a claim. War and nation-state exclusions are now standard after Lloyd's of London mandated them across the market. Cyber terrorism is typically carved out. Human error and insider attacks are often excluded or limited. Third-party vendor breaches may require a separate endorsement. Punitive fines across jurisdictions are frequently excluded.

The burden of proof for nation-state attribution falls on the insured, creating a grey area that insurers can exploit. If your organisation is attacked by a group linked to a nation-state actor, the insurer may deny the claim under the war exclusion — and you'll need to prove the attack was criminal, not geopolitical. This exclusion affects a significant portion of advanced persistent threat (APT) attacks.

To mitigate coverage gaps, organisations should conduct an annual policy review with a specialist cyber insurance broker, not a general commercial broker. Key questions to ask: What is the war/nation-state attribution standard? Are insider threats covered (malicious and negligent)? Does coverage extend to third-party vendor incidents? Are regulatory fines and legal defence costs included? What is the sub-limit for ransomware payments? Is social engineering fraud covered or excluded? The answers to these questions often reveal coverage gaps worth hundreds of thousands of dollars.

The MOVEit and SolarWinds incidents exposed a particularly dangerous gap: supply chain and systemic risk exclusions. When a single vendor vulnerability affects thousands of organisations simultaneously, insurers face correlated claims that threaten solvency. In response, reinsurers (Munich Re, Swiss Re) are imposing aggregation clauses that limit total payouts from a single systemic event. This means your policy may cover individual breaches but exclude or sub-limit losses from widespread supply chain incidents. Given that supply chain attacks have grown to represent a significant share of all cyber incidents, this exclusion deserves careful review.

Another emerging gap involves AI-related incidents. As organisations deploy AI systems, new liability risks emerge: AI-generated content that infringes copyright, algorithmic bias leading to discrimination claims, or AI systems making autonomous decisions that cause financial harm. Most current cyber policies do not explicitly address AI liability. Some insurers are developing AI-specific endorsements, but the coverage landscape remains unclear. Organisations deploying AI systems should specifically ask their insurer about AI-related coverage and consider whether a separate technology errors and omissions (Tech E&O) policy provides better protection for AI risks.

The practical impact of coverage gaps was starkly demonstrated in the Norsk Hydro case, where sub-limits and exclusions reduced a massive loss to just a 5% payout. The lesson: the quality of your cyber insurance is determined not by the headline coverage limit but by the exclusions, sub-limits, waiting periods, and notification requirements buried in the policy. A $10 million policy with a $500K ransomware sub-limit and a 72-hour notification requirement is worth far less than its face value suggests.

Coverage Gap Analyzer

Select an exclusion type to understand your risk exposure and recommended actions.

War / Nation-State Exclusion
Risk Level: HIGH
Lloyd's of London mandated war exclusions across all cyber policies. If an attack is attributed to a nation-state actor, your claim may be denied. The burden of proof for attribution falls on you as the insured.
Recommended action:
Request a clear attribution methodology from your insurer. Negotiate a 72-hour dispute resolution clause. Consider standalone cyber terrorism coverage.
Common exclusions based on Lloyd's, Munich Re, and Swiss Re policy reviews.

🌍 Regional Cyber Insurance Market (US, UK, EU)

🇺🇸 United States

The US accounts for approximately 55% of the global cyber insurance market with $7.075 billion in direct written premiums (NAIC). The US market experienced its first-ever YoY premium decline of -2.3% in 2024, driven by increased competition and improved loss ratios. However, claims surged 40% to approximately 50,000, and S&P forecasts a 15-20% premium rebound in 2026.

🇬🇧 United Kingdom

The UK cyber insurance market reached $1.53 billion in 2026 (Mordor Intelligence), projected to grow to $2.87 billion by 2030 at a 13.4% CAGR. UK adoption stands at 39% overall, with interesting size dynamics: small businesses (62%), medium (65%), and large (53%). The UK government is proposing a public sector ransom payment ban, which could reshape policy terms.

🇪🇺 European Union

Europe lags significantly behind the US and UK. Over 70% of major EU businesses remain uninsured (Howden). Adoption rates by country: Italy 22%, France, Germany, and Spain each under 30%. EU cyber attack costs total EUR 307 billion across France, Germany, Italy, and Spain combined (Howden). 41% of EU businesses with EUR 500M+ revenue plan to buy cyber insurance within 5 years. NIS2 implementation is expected to drive adoption.

The European insurance gap is partly structural. Many EU businesses rely on general liability or property policies that include limited cyber add-ons rather than standalone cyber coverage. These bolt-on provisions typically have low sub-limits ($100K-$500K) and extensive exclusions. NIS2 mandates incident reporting within 24 hours for essential entities and 72 hours for important entities — requirements that align with insurer expectations and may effectively force adoption as businesses realise their existing coverage is inadequate for regulatory compliance costs.

🌏 Asia-Pacific

The Asia-Pacific cyber insurance market is the fastest-growing regional segment, albeit from a low base. Japan, Australia, South Korea, and Singapore lead adoption, driven by data privacy regulations (Australia's Privacy Act amendments, Japan's APPI, Singapore's PDPA) and high-profile breaches. Australia's cyber insurance penetration is estimated at 10-20% of mid-market businesses, similar to European levels. The region faces unique challenges including diverse regulatory frameworks, varying levels of cybersecurity maturity, and language barriers in claims processing. Major global insurers (Chubb, AXA, Zurich) serve the APAC market, but local players are emerging with products tailored to regional risk profiles and regulatory requirements.

Regional Market Comparison

The regional disparities in cyber insurance adoption reflect different regulatory environments, risk awareness levels, and market maturity. The US market benefits from a decade-long head start, a litigious business environment that makes insurance essential for managing liability exposure, and state-level data breach notification laws that created demand before most other jurisdictions. The UK market is growing rapidly, aided by London's position as the global insurance hub and the influence of Lloyd's syndicate underwriting practices. Europe's gap will likely narrow as NIS2 enforcement creates compliance costs that insurance can offset. The key metric to watch is the EU adoption rate among businesses with EUR 500M+ revenue: the 41% that plan to buy within 5 years (Howden) represents a potential EUR 5-10 billion in new premiums.

Finding Value Source
US market (direct written premiums) $7.075B NAIC / AM Best
UK market size (2025) $1.53B Mordor Intelligence
UK market forecast (2030, 13.4% CAGR) $2.87B Mordor Intelligence
Major EU businesses without coverage >70% Howden
EU cyber attack costs (FR/DE/IT/ES combined) EUR 307B Howden

Nathan House's Analysis: Europe's EUR 215 Billion Uninsured Exposure

EU businesses face EUR 307 billion in cyber attack costs across France, Germany, Italy, and Spain (Howden). With over 70% of major EU businesses uninsured, that equates to approximately EUR 215 billion in uninsured losses. For context, that's larger than the GDP of Greece. NIS2 regulatory pressure and mandatory incident reporting will likely accelerate adoption, but the insurance gap represents a systemic risk to European business resilience.

🏦 Major Cyber Insurers Compared

~30%
Top 5 Insurers' Combined Market Share
Source: BeInsure Global Ranking (2024)

The cyber insurance market is less concentrated than most specialty insurance lines. The top five cyber insurers — Munich Re, Chubb, Beazley, Fairfax Financial Holdings, and AXA — collectively hold approximately 30% of the global market, with the remaining 70%+ distributed across dozens of smaller carriers. This fragmentation means buyers have significant negotiating leverage and should compare coverage from multiple insurers rather than defaulting to their existing property/casualty provider.

Each major insurer brings different strengths: Munich Re leads on capacity and reinsurance backing. Chubb offers the broadest risk coverage with strong claims handling. Beazley specialises in cyber/privacy risks with its well-known Breach Response product. Coalition pioneered the "active insurance" model with continuous security monitoring. AXA XL leverages advanced cyber analytics for large-scale clients. Understanding these differences is critical because policy terms vary significantly between carriers — what one insurer covers, another may exclude.

Insurer Comparison

Insurer Specialty Market Position Key Differentiator Best For
Munich Re Reinsurance + Primary #1 Global >$1B GDPW, largest capacity globally Large enterprises, high-limit policies
Chubb Broad risk coverage #2 Global Strongest claims handling, global underwriting Multi-national corporations
Beazley Cyber/privacy specialist #3 Global Breach Response (BBR) product, 48.5% loss ratio Mid-market, tech companies
AXA XL Large-scale analytics Top 5 Reinsurance strength, advanced cyber analytics Large enterprises, complex risks
Coalition Active insurance / InsurTech SMB Leader Continuous scanning, 52% claims resolved at $0 cost SMBs, mid-market, tech-forward firms
Travelers US commercial lines Top 10 US Bundled with commercial property, broad US network US businesses wanting bundled coverage
AIG Legacy cyber insurer Top 10 Global Long track record, lead insurer on major accounts Large enterprises, established relationships
Zurich Commercial lines Top 10 Global Strong EU presence, integrated risk management European enterprises, regulated industries
Sources: BeInsure Global Ranking, Beazley, Coalition, Munich Re, industry reports.

Industry Loss Ratios (2024)

Loss ratios indicate how much of premiums collected are paid out in claims. A lower ratio means higher profitability. The industry-wide US loss ratio reached 49% in 2024 (NAIC), up 7 points from the prior year. Beazley reported a 48.5% loss ratio in H1 2025. The combined ratio (including expenses) averaged 70% across 2022-2024 (Howden), which remains highly profitable — well below the 100% breakeven threshold.

49%
Industry Avg
US loss ratio (NAIC 2024)
48.5%
Beazley
Loss ratio (H1 2025)
70%
Combined Ratio
2022-2024 avg (Howden)

How to Choose a Cyber Insurer

Selecting the right cyber insurer requires matching your organisation's risk profile with the insurer's strengths. Key questions to consider:

  1. Company size: SMBs benefit from Coalition's active monitoring and lower premiums. Mid-market firms should compare Beazley's specialist coverage with Chubb's breadth. Large enterprises typically need Munich Re's capacity.
  2. Industry: Healthcare and financial services firms should prioritise insurers with regulatory defence cost coverage. Manufacturing firms need business interruption specialists.
  3. Geographic footprint: Multi-national organisations need global coverage — Chubb, Munich Re, and Zurich offer this. US-only businesses have more flexibility.
  4. War exclusion language: Post-Lloyd's mandate (April 2023), every insurer's war exclusion is different. Compare the attribution methodology and dispute resolution clauses.
  5. Incident response services: Beazley's Breach Response and Coalition's active scanning are market-leading. Evaluate whether your insurer offers pre-breach services, not just post-breach coverage.
  6. Sub-limits: Compare sub-limits for ransomware payments, social engineering fraud, regulatory fines, and third-party vendor breaches. The Norsk Hydro case (5% recovery rate) demonstrates how sub-limits can render coverage inadequate.

Specialist vs Generalist: Coverage Differences

The most consequential decision in cyber insurance is whether to buy from a specialist insurer or a generalist carrier offering cyber as an add-on. Specialist insurers like Beazley and Coalition write standalone cyber policies with dedicated claims teams, pre-breach services, and coverage terms designed specifically for cyber risk. Generalist carriers like Travelers and Hartford often offer cyber as an endorsement to existing commercial property or general liability policies.

Specialist Cyber Insurers

  • Standalone policies with cyber-specific terms
  • Dedicated cyber claims adjusters
  • Pre-breach services (scanning, monitoring)
  • Higher limits: $5M-$25M+ available
  • Breach response teams on retainer
  • Faster claims processing (hours, not weeks)

Generalist Carriers (Cyber Endorsement)

  • Bolt-on to commercial property policy
  • General claims teams handle cyber
  • No pre-breach services typically
  • Lower sub-limits: $100K-$1M common
  • May lack breach coaching expertise
  • Slower response for cyber-specific claims

The evolution from package-endorsed cyber coverage to standalone policies has been one of the market's most significant structural shifts. In 2018, approximately 35% of cyber premiums came from standalone policies. By 2024, standalone policies represent over 60% of the market (NAIC). This shift reflects growing recognition that cyber risk is fundamentally different from property or liability risk and requires purpose-built coverage. The NAIC's 2024 overhaul of its data collection from a two-way standalone/packaged split to a three-way primary/excess/endorsement classification further reflects this maturation.

Emerging Market Dynamics

Several emerging trends are reshaping the competitive landscape among cyber insurers. First, the InsurTech model pioneered by Coalition — where continuous security scanning is bundled with the policy — is being adopted by traditional carriers. This "active insurance" approach reduces loss frequency (Coalition reports lower claims frequency than industry averages), which justifies lower premiums and creates a competitive advantage. Beazley's Breach Response product similarly bundles pre-breach and post-breach services, blurring the line between insurance and cybersecurity consulting.

Second, AI-driven underwriting is transforming risk assessment. Rather than relying on lengthy application questionnaires, leading insurers now use external scanning tools (SecurityScorecard, BitSight) to assess an applicant's security posture in real time. This reduces the information asymmetry that has historically plagued cyber underwriting and enables more accurate pricing. Organisations with strong external security scores receive preferential rates; those with known vulnerabilities face higher premiums or coverage restrictions.

Third, the reinsurance layer is becoming more influential. Munich Re's position as both the largest primary cyber insurer and a major reinsurer gives it significant market influence. Reinsurers are imposing stricter aggregation limits and systemic risk clauses following events like MOVEit (which demonstrated how a single vendor vulnerability can trigger correlated claims across thousands of policyholders). These reinsurance constraints ultimately limit how much capacity primary carriers can offer.

Fourth, the shift from Beazley's forecast of a $40 billion cyber insurance market by 2030 to more conservative NAIC estimates reflects uncertainty about whether the current soft market will drive enough new adoption to sustain double-digit growth. The market's growth rate has already slowed from 40% annually (2020-2022) to 6% (2024). Future growth depends heavily on three factors: SMB adoption rates (currently 10-20%), regulatory mandates (NIS2, CIRCIA), and whether catastrophic systemic events accelerate or deter coverage purchases.

Finding Value Source
Munich Re gross premiums (largest globally) >$1B BeInsure
Top 5 insurers combined market share ~30% BeInsure
Beazley loss ratio (H1 2025) 48.5% Beazley
Beazley cyber rate change (H1 2025) -6.8% Beazley
Industry combined ratio (2022-2024 avg) 70% Howden
US industry loss ratio (2024) 49% NAIC

Nathan House's Analysis: The Insurer Selection Paradox

The top 5 cyber insurers hold only ~30% of the global market. That's unusually fragmented for specialty insurance — professional liability, for example, is far more concentrated. This fragmentation benefits buyers: you have leverage. But it also means coverage quality varies enormously. A Coalition policy with active scanning and $0-cost claim resolution for 52% of incidents is fundamentally different from a Travelers bolt-on endorsement. Don't treat cyber insurance as a commodity. The difference between a specialist cyber insurer and a general carrier adding cyber as a line extension can be the difference between a paid claim and a denied one.

💹 Cyber Insurance Profitability Statistics

Combined Ratio (Lower = More Profitable)
70 /100

Cyber insurance has been consistently profitable. Global combined ratios averaged 70% between 2022-2024 (Howden), well below the 100% breakeven threshold. Cumulative underwriting profit totalled approximately $9 billion over that period. S&P maintains a stable outlook for 2025-2026.

The US loss ratio rose 7 points to 49% in 2024 (NAIC), still profitable but the highest since the 2022 hard market correction. Beazley reported a 48.5% loss ratio in H1 2025. The Fitch combined ratio of 47% includes defence and cost containment expenses. The concern: stagnant or declining rates combined with a 40% surge in claims could erode profits. If loss ratios continue climbing while competition keeps rates soft, the industry may face another hard market correction similar to 2021-2022.

For context, a combined ratio below 100% means the insurance line is profitable before investment income. At 70%, cyber insurance is substantially more profitable than most property and casualty lines. The $9 billion in cumulative underwriting profit (2022-2024) attracted new market entrants, which increased competition and drove rates down. This cycle is typical in insurance: profitable lines attract capital, competition lowers rates, eventually loss ratios rise, unprofitable carriers exit, and rates harden again. The cyber insurance market appears to be approaching the late-stage softening phase.

Comparing cyber insurance profitability with other commercial lines highlights its attractiveness. Commercial auto insurance typically operates at combined ratios of 95-110%, meaning it frequently loses money on underwriting. Workers' compensation averages 85-95%. Cyber insurance at 70% is among the most profitable insurance lines available. This profitability differential explains why capital continues to flow into the cyber market even as rates decline — and why the market has attracted non-traditional entrants including InsurTech firms, private equity-backed MGAs, and parametric insurance providers.

Why Profitability Is Under Pressure

The 2024 data reveals emerging pressure on the market's profitability. The US loss ratio's 7-point increase to 49% (NAIC) was driven by a 40% surge in claims count. While a 49% loss ratio is still highly profitable, the trend direction matters more than the absolute level. If claims continue growing at 30-40% annually while rates decline or remain flat, loss ratios will cross the profitability threshold within 2-3 years. Several factors suggest claims will continue growing: AI-enabled phishing is lowering the cost and increasing the scale of attacks, the attack surface continues expanding with remote work and cloud adoption, and ransomware threat actors are shifting from encryption-only attacks to data theft and extortion, which creates claims even when organisations have strong backup infrastructure.

The insurer response to eroding profitability will likely mirror the 2021-2022 pattern but with more sophisticated tools. Rather than blanket rate increases, leading carriers will use granular underwriting data to differentiate between well-protected and poorly-protected risks. Organisations with strong security postures (MFA, EDR, immutable backups, tested IR plans) may see stable or moderately increasing rates. Organisations lacking these controls will face significant premium increases, policy restrictions, or coverage denials. This risk-based pricing approach benefits well-prepared organisations and effectively penalises those that underinvest in security.

Reinsurers play a critical role in the profitability equation. Munich Re and Swiss Re, as both primary cyber insurers and major reinsurers, effectively set the floor for pricing across the market. When reinsurers increase their rates (which typically happens when primary loss ratios begin deteriorating), primary carriers pass those costs through to policyholders. The reinsurance renewal cycle in January 2026 will be a leading indicator of whether the primary market will harden in mid-2026 as S&P forecasts.

Finding Value Source
Average combined ratio (2022-2024) 70% Howden
Cumulative underwriting profit (2022-2024) $9B Howden
US loss ratio (2024, +7 points) 49% NAIC
US combined loss + DCC ratio 47% Fitch Ratings

🔮 Cyber Insurance Market Predictions (2026-2030)

Several cyber insurance trends point to significant market expansion. S&P Global forecasts $23 billion in global premiums by 2026, with 15-20% premium increases reversing two years of rate declines. Munich Re projects the market will double by 2030, reaching at least $30 billion at over 10% annual growth. The conservative 2030 forecast from MarketsandMarkets projects $32.19 billion at a 14.2% CAGR. Aggressive forecasts reach $84.62 billion at a 26.1% CAGR.

Four key drivers will shape the market over the next five years. First, regulatory pressure: GDPR enforcement, NIS2 implementation, and CIRCIA mandatory reporting requirements are pushing organisations toward coverage. Second, ransomware evolution: data theft/extortion is replacing encryption-only attacks, expanding the scope of insurable losses. Third, SMB adoption growth: 65% of SMBs plan to increase spending, representing the market's largest growth opportunity. Fourth, AI-driven underwriting: automated risk assessment tools are reducing costs and improving accuracy, enabling insurers to price risk more precisely and potentially expand into underserved markets.

The gap between conservative and aggressive 2030 forecasts ($32B vs $85B) reflects genuine uncertainty. The conservative scenario assumes incremental SMB adoption and stable attack rates. The aggressive scenario assumes regulatory mandates drive near-universal adoption in regulated industries and ransomware losses continue escalating. Reality will likely fall between these bounds, but the direction is unambiguous: cyber insurance is the fastest-growing insurance line globally and will remain so through the end of the decade.

AI's Impact on Cyber Insurance (2025-2030)

Artificial intelligence is reshaping both sides of the cyber insurance equation. On the threat side, AI-enabled phishing, deepfake-driven social engineering, and automated vulnerability scanning are lowering the cost of attacks while increasing their scale and sophistication. The MGM and Caesars cases (2023) already demonstrated how social engineering defeats even well-resourced targets — AI will make these attacks more scalable and harder to detect. Insurers are beginning to model AI-augmented attack scenarios in their loss projections, and some are adding AI-specific exclusions or endorsements.

On the defence and underwriting side, AI is enabling more granular risk assessment. Rather than relying on annual application questionnaires, leading insurers use continuous scanning, external security ratings, and machine learning models to assess policyholder risk in real time. Coalition's active insurance model is an early example of this approach. By 2030, expect most major cyber insurers to offer dynamic pricing that adjusts based on real-time security posture — similar to how telematics transformed auto insurance. Organisations that maintain strong, verifiable security controls will benefit from lower premiums; those that don't will face increasingly prohibitive costs or coverage restrictions.

Regulatory Drivers of Market Growth

Three regulatory frameworks will significantly influence cyber insurance demand through 2030. The EU's NIS2 Directive (effective October 2024) imposes strict incident reporting requirements and security obligations on essential and important entities across 18 sectors — organisations that fail to comply face fines of up to EUR 10 million or 2% of global revenue. In the US, CISA's Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) will require mandatory reporting for over 300,000 entities starting in 2026. And the SEC's cybersecurity disclosure rules (effective December 2023) require publicly traded companies to disclose material cybersecurity incidents within four business days. Each of these regulations creates a compliance cost that cyber insurance can help mitigate, effectively converting regulatory pressure into insurance demand.

The convergence of AI-driven threats, regulatory mandates, and the ongoing shift from package endorsements to standalone coverage creates a structural growth floor for the market. Even in the conservative scenario ($32B by 2030), the market doubles from current levels. The key variable is how quickly SMB adoption grows from its current 10-20% rate. If regulatory requirements extend to smaller entities (as NIS2 does in Europe), the addressable market expands dramatically. Beazley's forecast of $40 billion by 2030 assumes moderate SMB growth; Munich Re's more aggressive estimates assume regulatory-driven acceleration.

Finding Value Source
S&P Global forecast (2026) $23B S&P Global Ratings
S&P US premium increase forecast (2026) +15-20% S&P Global
Munich Re growth rate to 2030 >10% Munich Re
Conservative 2030 forecast $32.19B MarketsandMarkets

📋 Key Takeaways

  1. The market is growing but premiums are about to rise. After a -22% rate decline from the 2022 peak, S&P forecasts 15-20% increases in 2026. Businesses renewing in 2026 should budget accordingly.
  2. Ransomware is the 91% problem. Just 9.6% of claims but 91% of losses. Insurers are pricing and underwriting primarily around ransomware risk. Your ransomware defences directly determine your premium and claim outcome.
  3. 41% of applications are denied. MFA, EDR, and immutable backups are non-negotiable. Missing any of these three controls is near-certain denial. Document everything and report incidents within 24-72 hours.
  4. SMBs are the most exposed. 10-20% adoption vs 60-70% for large enterprises. SMBs face higher ransomware rates (88% of breaches) with less coverage. The protection gap is the market's biggest structural risk.
  5. Europe is massively underinsured. Over 70% of major EU businesses lack coverage, facing EUR 307 billion in attack costs. NIS2 will drive adoption, but the gap represents systemic risk today.
  6. Coverage gaps can nullify your policy. War exclusions, insider threats, vendor breaches, and regulatory fines are commonly excluded. Read your policy exclusions before you need to file a claim, not after.
  7. War exclusions have been rewritten. Merck won the largest cyber claim in history against traditional war exclusions, but Lloyd's mandate (April 2023) means all new policies explicitly exclude nation-state attacks. The legal victories of 2022-2024 won't protect policyholders under post-2023 language.
  8. Premiums grew 3.5x in six years. From $2.02B (2018) to $7.08B (2024) in the US alone. Rates spiked +133% in Q4 2021, then declined -22% from the 2022 peak. The cycle is turning again with S&P forecasting 15-20% increases for 2026.
  9. Choose your insurer carefully. The top 5 cyber insurers hold only ~30% market share. Coverage quality varies enormously between specialist cyber insurers (Beazley, Coalition) and generalist carriers adding cyber as an endorsement. Standalone policies outperform package endorsements on limits, claims handling, and denial rates.
  10. Sub-limits can negate coverage. Norsk Hydro's 5% recovery rate is the most extreme example. Always verify sub-limits for ransomware, business interruption, and data restoration before signing your policy.

Frequently Asked Questions

How much does cyber insurance cost for a small business?

Small businesses pay an average of $134/month ($1,740/year) for cyber insurance, with 38% paying less than $100/month. Costs vary by industry, revenue, and security posture — IT businesses average $148/month while finance averages $58/month.

What percentage of cyber insurance claims are denied?

Between 25-40% of cyber insurance claims are denied, with 41% of applications rejected on first submission. The top reasons include missing MFA (37% of denials), insufficient documentation (44%), and late reporting beyond the 24-72 hour window (17%).

What security controls do cyber insurers require?

Around 80% of insurers require multi-factor authentication (app-based or hardware tokens, not SMS), 65% expect endpoint detection and response (EDR), and nearly all require immutable or isolated backups. Underwriters now demand proof via screenshots rather than verbal attestations.

How big is the global cyber insurance market?

The global cyber insurance market reached $15.3 billion in 2024 (Munich Re) and is projected at $16.6 billion for 2026 (Swiss Re). S&P Global forecasts $23 billion by 2026, with 2030 estimates ranging from $32 billion to $85 billion depending on the research firm.

Does cyber insurance cover ransomware payments?

Most policies still cover ransomware payments but with stricter conditions. However, 86% of affected businesses now refuse to pay ransoms. Ransomware accounts for only 9.6% of claims but 91% of incurred losses. Some insurers are reducing or eliminating ransom reimbursement, and the UK is proposing to ban public sector ransom payments.

What is the most common cause of cyber insurance claims?

Business email compromise (BEC) and funds transfer fraud (FTF) account for 60% of all cyber insurance claims. While ransomware represents only 9.6% of claims, it accounts for 91% of incurred losses, with average ransomware damages reaching $1.18 million in 2026.

What is the war exclusion in cyber insurance?

The war exclusion allows insurers to deny claims for losses caused by nation-state or state-sponsored cyberattacks. Lloyd's of London mandated updated war exclusions across all cyber policies from April 2023. Merck successfully challenged a traditional war exclusion in its record-setting NotPetya claim (settled January 2024), but post-2023 policies use updated language specifically addressing cyber operations by governments. If your organisation is targeted by a state-affiliated group (like APT28, APT41, or Lazarus Group), your claim may be denied under this exclusion.

What is the largest cyber insurance claim in history?

Merck's $1.4 billion claim from the 2017 NotPetya attack is the largest publicly known cyber insurance claim. The claim was disputed by eight insurers citing a war exclusion, but New Jersey courts ruled the exclusion did not apply. The parties reached a confidential settlement in January 2024, with approximately $700 million of the claim in dispute. Other major claims include MGM Resorts (2023), Mondelez (NotPetya), and Norsk Hydro (where only $3.6M of a much larger loss was paid by insurance).

How have cyber insurance premiums changed over time?

US cyber insurance premiums grew from $2.02 billion in 2018 to $7.075 billion in 2024 — a 3.5x increase. The market experienced a dramatic hard market in 2021-2022, with rate increases peaking at +133% (Marsh, Q4 2021) driven by the ransomware crisis. Rates have since declined -22% from the 2022 peak, with 2024 marking the first-ever year-over-year premium decline (-2.3%). However, S&P Global forecasts 15-20% premium increases for 2026 as claims surge and the softening cycle ends.

Which are the best cyber insurance companies?

The top cyber insurers globally are Munich Re (#1 by premiums, >$1B GDPW), Chubb (#2, broadest risk coverage), and Beazley (#3, cyber/privacy specialist with 48.5% loss ratio). For SMBs, Coalition's "active insurance" model with continuous scanning is a strong option. AXA XL and Zurich serve large enterprises and European markets. The best choice depends on your company size, industry, and geography. Specialist cyber insurers (Beazley, Coalition) generally outperform generalist carriers on claims handling, coverage terms, and denial rates.

Should I get standalone cyber insurance or a package endorsement?

Standalone cyber insurance is strongly recommended over package endorsements for most organisations. Standalone policies have grown from ~35% of the market in 2018 to over 60% in 2024. They typically offer higher limits ($5M-$25M+ vs $100K-$1M for endorsements), dedicated cyber claims teams, pre-breach services (scanning, monitoring), and broader coverage terms. The Norsk Hydro case — where only 5% of total losses were covered — illustrates the risks of inadequate coverage limits common in package endorsements.

About This Data

This article draws from 97 statistics aggregated from 50+ authoritative sources including IBM Cost of a Data Breach, Verizon DBIR, CrowdStrike Global Threat Report, WEF Global Cybersecurity Outlook, FBI IC3, ISC2 Cybersecurity Workforce Study, Sophos, Gartner, Mandiant M-Trends, and Ponemon Institute reports.

Derived statistics (marked "Nathan House's Analysis") are computed by cross-referencing data from multiple sources — for example, comparing breach costs across industries using IBM data, or validating ransomware trends across Verizon, Sophos, and HIPAA Journal findings.

All statistics include inline source citations with links to primary sources. Data spans 2023-2026, with preference given to the most recent available figures. Last updated: March 2026.

How to Use This Data

Security professionals and risk managers can use these cyber insurance statistics to benchmark coverage, justify security control investments, and negotiate better policy terms. The derived statistics highlight cost differentials and denial risks that resonate with CFOs and board-level decision-makers. Use the interactive tools to estimate your premium and assess readiness before approaching insurers.

This page is updated monthly as new reports are published. Bookmark it and return for the latest data. If you spot an outdated statistic or want to suggest a source, contact us.

About the Author

Nathan House

Nathan House, StationX

Nathan House is a cybersecurity expert with 30 years of hands-on experience. He holds OSCP, CISSP, and CEH certifications, has secured £71 billion in UK mobile banking transactions, and has worked with clients including Microsoft, Cisco, BP, Vodafone, and VISA. Named Cyber Security Educator of the Year 2020 and a UK Top 25 Security Influencer 2025, Nathan is a featured expert on CNN, Fox News, and NBC. He founded StationX, which has trained over 500,000 students in cybersecurity.