{"id":13576,"date":"2026-04-09T05:06:03","date_gmt":"2026-04-09T05:06:03","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13576"},"modified":"2026-04-09T05:06:03","modified_gmt":"2026-04-09T05:06:03","slug":"rsac-2026-cyber-insurance-coverage-and-the-rise-of-ransomware","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13576","title":{"rendered":"RSAC 2026: Cyber insurance coverage and the rise of ransomware"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content-body\">&#13;<\/p>\n<p>John Kindervag opened his session at RSAC 2026 Convention with a compelling proposition: The arrival of life insurance coverage provided a brand new motivation to commit homicide.<\/p>\n<p>The Forrester alumnus, who&#8217;s extensively credited because the creator of the zero-trust safety mannequin, and present chief evangelist at Illumio, argued that, whereas homicide has all the time been a part of society, life insurance coverage layered a monetary incentive on prime of an historic crime.<\/p>\n<p>In the present day, he mentioned, that equates to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cybersecurity-insurance-cybersecurity-liability-insurance\">cyber insurance coverage<\/a> giving digital criminals a profitable new motive to escalate the decades-old follow of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/ransomware\">ransomware<\/a> fraud.<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"Ransomware evolves\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>Ransomware evolves<\/h2>\n<p>The ransomware age dawned in 1989. An evolutionary biologist, Joseph L. Popp, distributed hundreds of floppy disks, labeled as respectable analysis software program, to attendees of a World Well being Group AIDS convention. As soon as put in, this system on the disks &#8212; later dubbed the AIDS Trojan &#8212; lay dormant till activated after a predetermined variety of system reboots. The malware hid directories and encrypted file names with symmetric encryption, rendering the pc unusable. Victims have been introduced with a message to ship a $189 fee to a P.O. field in Panama to regain entry.<\/p>\n<p>As computing and networks have grown extra refined, so have the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/The-history-and-evolution-of-ransomware\">applied sciences and strategies employed in ransomware schemes<\/a>.<\/p>\n<p>Within the early 2000s, fundamental file-renaming and locking methods have been changed by uneven encryption. Distribution turned simpler as electronic mail attachments and  provided new strategies to contaminate methods. Cost, too, turned simpler as  supplied anonymity with out banking oversight. In 2019, extortion turned a well-liked tactic; past simply encrypting and locking knowledge, attackers now stole it and threatened to publish it or leak it on the darkish internet.<\/p>\n<p>By the 2020s, innovation had reached breakneck velocity, with  enabling large-scale, multivector knowledge exfiltration and extortion from even probably the most safe authorities businesses and international enterprises.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"The dawn of cyber insurance\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>The daybreak of cyber insurance coverage<\/h2>\n<p>The cyber insurance coverage business rose in parallel with higher reliance by companies on the web and digital storage, in addition to the expansion of rising cybersecurity threats.<\/p>\n<p>Business insurers started experimenting with coverages within the Nineties, providing slim third-party legal responsibility insurance policies overlaying injury brought on by hacker-induced breaches. By the top of the last decade, insurers have been issuing the primary extensively marketed cyber insurance coverage insurance policies, overlaying <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/How-to-calculate-the-cost-of-a-data-breach\">knowledge breach response and enterprise interruption prices<\/a>. Within the 2000s, extra firms started providing merchandise and started promoting first-party protection that insured policyholders and different events affected by cyber incidents.<\/p>\n<p>The business has been maturing ever since, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Cyber-insurance-explained-from-selection-to-post-purchase\">increasing product portfolios<\/a> to incorporate breach notification, credit score monitoring, regulatory protection, ransomware negotiation, provide chain protection and extortion protections. Because the menace panorama has turn out to be extra perilous, premiums have spiked. Based on Kindervag, the market has grown 40-fold previously 20 years and is presently estimated at almost $21 billion.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"The business of it all\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>The enterprise of all of it<\/h2>\n<p>Based on the &#8220;Resilience 2025 Midyear Cyber Danger Report,&#8221; ransomware-related incidents have been accountable for greater than 90% of losses within the first half of 2025.<\/p>\n<p>Kindervag was fast to level out that each insurers and ransomware menace actors are motivated by the identical factor, relaying a dialog with a cyber insurance coverage govt who defined, &#8220;I might deny each declare. I am not going to do this, as a result of all I&#8217;ve to do is ensure that I am making extra money than I am paying out. It is a enterprise to me. I am not attempting to switch threat. I am attempting to earn cash. So so long as the monetary equation works, we&#8217;ll preserve making ransomware insurance policies.&#8221;<\/p>\n<p>The most important portion of many cybersecurity budgets, Kindervag said, is devoted to paying ransomware. In 2018, firms paid about $39 million to have their knowledge launched, and inside 5 years, that determine had ballooned to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/go.chainalysis.com\/2025-Crypto-Crime-Report.html\" target=\"_blank\" rel=\"noopener\">greater than $813 million<\/a>. Even when paying such staggering quantities, it behooves insurance coverage firms to restrict the variety of riders on their insurance policies, so paying premiums nonetheless makes sound enterprise sense for his or her industrial policyholders.<\/p>\n<p>&#8220;For some firms,&#8221; Kindervag mentioned, &#8220;They simply contemplate [ransomware] a part of doing enterprise.&#8221;<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"How much you got?\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>How a lot you bought?<\/h2>\n<p>With a big, profitable business of economic insurers prepared to pay ransomware calls for for his or her prospects, criminals have grown bolder but additionally extra pragmatic. They know insurers are prepared to pay and may usually decide the protection quantities enterprises carry by means of knowledge breaches and different strategies. The result&#8217;s an underground group of ransomware actors who can bypass the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/Ransomware-negotiation-Does-it-work-and-should-you-try-it\">negotiation section<\/a> when holding knowledge or methods hostage. Quite than interact in time-consuming haggling, they merely ask for the quantity they know might be paid to the sufferer.<\/p>\n<p>&#8220;They&#8217;re arising and asking you ways a lot cash you might be getting,&#8221; Kindervag mentioned. &#8220;That is how a lot we&#8217;re going to cost you. Not a penny extra. They do not need further. They simply need what&#8217;s coming to them, what&#8217;s truthful of their world. They seem to be a enterprise similar to you are a enterprise.&#8221;<\/p>\n<p>A number of years in the past, for instance, the ransom be aware despatched with Hardbit ransomware learn, &#8220;For those who instructed us anonymously that your organization was insured for $10 million and different essential particulars relating to insurance coverage protection, we&#8217;d not demand greater than $10 million in correspondence with the insurance coverage agent.&#8221;<\/p>\n<p>Kindervag summarized the scenario, &#8220;Ransomware quantities elevated 2.8 instances if the victims had insurance coverage protection. Consider that as a knowledge level. The truth that you had insurance coverage elevated the amount of cash you have been going to pay for ransomware.&#8221;<\/p>\n<blockquote class=\"main-article-pullquote\">\n<p><figure>\n    Ransomware quantities elevated 2.8 instances if the victims had insurance coverage protection. Consider that as a knowledge level. The truth that you had insurance coverage elevated the amount of cash you have been going to pay for ransomware.<br \/>\n   <\/figure><figcaption>\n    <strong>John Kindervag<\/strong><br \/>\n   <\/figcaption><i class=\"icon\" data-icon=\"z\"\/>\n  <\/p>\n<\/blockquote>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"A policy problem\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>A coverage downside<\/h2>\n<p>Kindervag did not let enterprises off the hook in his session. He attested that unhealthy coverage permits ransomware occasions. When safety professionals have poor visibility into methods and controls are within the improper locations, menace actors can achieve the entry wanted to carry firms hostage. If an attacker has an extended dwell time to assemble the knowledge wanted to breach delicate knowledge, that&#8217;s merely poor safety coverage.<\/p>\n<p>These insurance policies, he argued, have performed a big position within the explosive proliferation of ransomware occasions. As a result of the cyber insurance coverage enterprise mannequin doesn&#8217;t essentially reward stringent cybersecurity fashions, that business has additionally been instrumental within the rise of ransomware.<\/p>\n<p>Kindervag advocated <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/The-ultimate-guide-to-cybersecurity-planning-for-businesses\">robust cybersecurity first<\/a>. But when safety insurance policies are inadequate to cease ransomware makes an attempt, he suggested firms to not stand on precept as a result of at that time it is too late. &#8220;That is the top of the chain. You failed at the start with coverage, and now you are paying the value for having unhealthy coverage.&#8221;<\/p>\n<p><i>Richard Livingston is an editor with Informa TechTarget&#8217;s SearchSecurity website, overlaying cybersecurity information, tendencies<\/i><i> and evaluation.<\/i><\/p>\n<\/section>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>&#13; John Kindervag opened his session at RSAC 2026 Convention with a compelling proposition: The arrival of life insurance coverage provided a brand new motivation to commit homicide. The Forrester alumnus, who&#8217;s extensively credited because the creator of the zero-trust safety mannequin, and present chief evangelist at Illumio, argued that, whereas homicide has all the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[959,2904,500,2292,1924],"class_list":["post-13576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cyber","tag-insurance","tag-ransomware","tag-rise","tag-rsac"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13576"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13576\/revisions"}],"predecessor-version":[{"id":13577,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13576\/revisions\/13577"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13578"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-09 08:08:56 UTC -->