{"id":18768,"date":"2017-08-15T08:00:25","date_gmt":"2017-08-15T08:00:25","guid":{"rendered":"http:\/\/colemont.lt\/?p=18768"},"modified":"2017-10-11T10:27:19","modified_gmt":"2017-10-11T10:27:19","slug":"counting-cost-lloyds-emerging-risk-report","status":"publish","type":"post","link":"https:\/\/colemont.lt\/en\/counting-cost-lloyds-emerging-risk-report\/","title":{"rendered":"Counting the cost. A Lloyd&#8217;s emerging risk report"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<h3>While digitisation is revolutionising business and daily life, it is also making the global economy more vulnerable to cyber-attacks. As the cyber threat grows so the demand for cyber insurance increases.<\/h3>\n<p style=\"text-align: left;\">Today, Lloyd\u2019s Class of Business team estimates that the global cyber market is worth between $3 billion and $3.5 billion. Despite this growth, insurers\u2019 understanding of cyber liability and risk aggregation is an evolving process as experience and knowledge of cyber-attacks grows.<\/p>\n<p style=\"text-align: left;\">The aim of this report is to provide insurers who write cyber coverage with realistic and plausible scenarios to help quantify cyber-risk aggregation.<\/p>\n<p style=\"text-align: left;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18774 size-full\" src=\"http:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-Major-cyber-attack-losses.jpg\" alt=\"A Lloyd's emerging risk report, Major cyber attack losses\" width=\"800\" height=\"513\" srcset=\"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-Major-cyber-attack-losses.jpg 800w, https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-Major-cyber-attack-losses-600x385.jpg 600w, https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-Major-cyber-attack-losses-768x492.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p style=\"text-align: left;\"><!--more--><\/p>\n<p style=\"text-align: left;\">By understanding cyber-risk exposure, insurers can improve their portfolio exposure management, set appropriate limits and gain the confidence to expand into this fast-growing insurance class.<\/p>\n<p style=\"text-align: left;\">The report is designed for risk managers whose businesses are exposed to the types of cyber-attacks described in the report\u2019s two scenarios: a hack that takes down their cloud-service provider or an attack that causes the failure of a particular operating system across their own company, customers, suppliers and\/or business partners.<\/p>\n<p style=\"text-align: left;\">We have also produced a technical guide for underwriters, exposure managers and managing agents in the Lloyd\u2019s market which details how to apply the methodology to risk portfolios.<\/p>\n<p style=\"text-align: left;\"><!--more--><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/app.smartsheet.com\/b\/form\/82e2be6061de4035aa23382efc127948\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18769 size-full\" src=\"http:\/\/colemont.lt\/wp-content\/uploads\/2017\/10\/A-Lloyds-emerging-risk-report.jpg\" alt=\"Lloyd's emerging risk report\" width=\"260\" height=\"370\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><!--more--><\/p>\n<p>[\/vc_column_text][ult_buttons btn_title=&#8221;DOWNLOAD&#8221; btn_link=&#8221;url:https%3A%2F%2Fapp.smartsheet.com%2Fb%2Fform%2F82e2be6061de4035aa23382efc127948|title:A%20Lloyd&#8217;s%20emerging%20risk%20report|target:%20_blank|&#8221; btn_align=&#8221;ubtn-center&#8221; btn_title_color=&#8221;#ffffff&#8221; btn_bg_color=&#8221;#002347&#8243; btn_icon_pos=&#8221;ubtn-sep-icon-at-left&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The report is designed for risk managers whose businesses are exposed to the types of cyber-attacks described in the report\u2019s two scenarios: a hack that takes down their cloud-service provider or an attack that causes the failure of a particular operating system across their own company, customers, suppliers and\/or business partners.<\/p>\n","protected":false},"author":2,"featured_media":18771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[318],"tags":[],"class_list":["post-18768","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-be-kategorijos-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Counting the cost. A Lloyd&#039;s emerging risk report<\/title>\n<meta name=\"description\" content=\"The Lloyd&#039;s emerging risk reports designed for risk managers whose businesses are exposed to the types of cyber-attacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Counting the cost. A Lloyd&#039;s emerging risk report\" \/>\n<meta property=\"og:description\" content=\"The Lloyd&#039;s emerging risk reports designed for risk managers whose businesses are exposed to the types of cyber-attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost\" \/>\n<meta property=\"og:site_name\" content=\"Colemont\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Colemont-Draudimo-Brokeris-1210664089020340\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-15T08:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-11T10:27:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"538\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ina\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/colemont.lt\/en\/counting-cost-lloyds-emerging-risk-report\/\",\"url\":\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost\",\"name\":\"Counting the cost. A Lloyd's emerging risk report\",\"isPartOf\":{\"@id\":\"https:\/\/colemont.lt\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#primaryimage\"},\"thumbnailUrl\":\"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg\",\"datePublished\":\"2017-08-15T08:00:25+00:00\",\"dateModified\":\"2017-10-11T10:27:19+00:00\",\"author\":{\"@id\":\"https:\/\/colemont.lt\/en\/#\/schema\/person\/a42ea22ce08946873b756967a33b17d6\"},\"description\":\"The Lloyd's emerging risk reports designed for risk managers whose businesses are exposed to the types of cyber-attacks\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#primaryimage\",\"url\":\"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg\",\"contentUrl\":\"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg\",\"width\":538,\"height\":365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/colemont.lt\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Counting the cost. A Lloyd&#8217;s emerging risk report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/colemont.lt\/en\/#website\",\"url\":\"https:\/\/colemont.lt\/en\/\",\"name\":\"Colemont\",\"description\":\"UADBB \u201cColemont draudimo brokeris\u201d\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/colemont.lt\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/colemont.lt\/en\/#\/schema\/person\/a42ea22ce08946873b756967a33b17d6\",\"name\":\"Ina\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/colemont.lt\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c31f2d117617d11ccf361c05cec0bde58b3786ef48ee1463e80c54a2e0e5edc9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c31f2d117617d11ccf361c05cec0bde58b3786ef48ee1463e80c54a2e0e5edc9?s=96&d=mm&r=g\",\"caption\":\"Ina\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Counting the cost. A Lloyd's emerging risk report","description":"The Lloyd's emerging risk reports designed for risk managers whose businesses are exposed to the types of cyber-attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost\/","og_locale":"en_US","og_type":"article","og_title":"Counting the cost. A Lloyd's emerging risk report","og_description":"The Lloyd's emerging risk reports designed for risk managers whose businesses are exposed to the types of cyber-attacks","og_url":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost","og_site_name":"Colemont","article_publisher":"https:\/\/www.facebook.com\/Colemont-Draudimo-Brokeris-1210664089020340\/","article_published_time":"2017-08-15T08:00:25+00:00","article_modified_time":"2017-10-11T10:27:19+00:00","og_image":[{"width":538,"height":365,"url":"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg","type":"image\/jpeg"}],"author":"Ina","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/colemont.lt\/en\/counting-cost-lloyds-emerging-risk-report\/","url":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost","name":"Counting the cost. A Lloyd's emerging risk report","isPartOf":{"@id":"https:\/\/colemont.lt\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#primaryimage"},"image":{"@id":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#primaryimage"},"thumbnailUrl":"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg","datePublished":"2017-08-15T08:00:25+00:00","dateModified":"2017-10-11T10:27:19+00:00","author":{"@id":"https:\/\/colemont.lt\/en\/#\/schema\/person\/a42ea22ce08946873b756967a33b17d6"},"description":"The Lloyd's emerging risk reports designed for risk managers whose businesses are exposed to the types of cyber-attacks","breadcrumb":{"@id":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#primaryimage","url":"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg","contentUrl":"https:\/\/colemont.lt\/wp-content\/uploads\/2017\/08\/A-Lloyds-emerging-risk-report-2017.jpg","width":538,"height":365},{"@type":"BreadcrumbList","@id":"https:\/\/www.lloyds.com\/news-and-insight\/risk-insight\/library\/technology\/countingthecost#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/colemont.lt\/en\/"},{"@type":"ListItem","position":2,"name":"Counting the cost. A Lloyd&#8217;s emerging risk report"}]},{"@type":"WebSite","@id":"https:\/\/colemont.lt\/en\/#website","url":"https:\/\/colemont.lt\/en\/","name":"Colemont","description":"UADBB \u201cColemont draudimo brokeris\u201d","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colemont.lt\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/colemont.lt\/en\/#\/schema\/person\/a42ea22ce08946873b756967a33b17d6","name":"Ina","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/colemont.lt\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c31f2d117617d11ccf361c05cec0bde58b3786ef48ee1463e80c54a2e0e5edc9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c31f2d117617d11ccf361c05cec0bde58b3786ef48ee1463e80c54a2e0e5edc9?s=96&d=mm&r=g","caption":"Ina"}}]}},"_links":{"self":[{"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/posts\/18768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/comments?post=18768"}],"version-history":[{"count":0,"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/posts\/18768\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/media\/18771"}],"wp:attachment":[{"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/media?parent=18768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/categories?post=18768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colemont.lt\/en\/wp-json\/wp\/v2\/tags?post=18768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}