CyberCube launched Cyber Aggregation Event Response Service (CAERS) a new cyber incident response service for clients of its SaaS products. Kroll will provide information and guidance to CyberCube’s clients on major cyber aggregation events and frontline threat intelligence derived from thousands of incident response cases handled each year.
CyberCube is a cloud-based platform, which is known for its data access and advanced multi-disciplinary analytics, assists insurance organizations in making better decisions when placing insurance, underwriting cyber risk, and managing cyber risk aggregation.
Following a major cyber event, the CAERS team will provide the most up-to-date information to CyberCube’s clients, while CyberCube’s SaaS products, such as Broker Manager, Account Manager, and Portfolio Manager, will aid in the response to any looming cyber disaster.
Darren Thomson, Head of Cyber Intelligence Services at CyberCube commented, “With cyber events becoming increasingly common, the speed and accuracy with which organizations respond to them is critical. That’s why we’ve launched this response service, specifically tailored to CyberCube’s growing client base. The pressure on our clients during a major cyberattack can be extreme. With CAERS, our team—comprising data scientists, actuaries, engineers, economists, and cyber security experts—will become an extension of our clients’ teams, providing the updates they need and sharing both our expertise and data.”
CyberCube’s products include Portfolio Manager, Broking Manager, and Account Manager, which are designed for insurance intermediaries and risk carriers and are used by industry leaders across the insurance ecosystem.
Benedetto Demonte, Chief Operating Officer for Kroll’s Cyber Risk practice stated, “We’re pleased to be contributing to CAERS because effective incident response depends on the most current and relevant threat intelligence available. In our most recent Threat Landscape Report, we saw a 356% growth in the number of attacks quarter-on-quarter where the infection vector was a zero-day or freshly announced software exploit. Ransomware groups have also been found to be leveraging newly announced vulnerabilities just days after release. It is only with access to frontline intelligence that firms can prioritize resources, mitigate the risk of a cyberattack and react appropriately if the worst happens.”
Read more articles: