Mapping the coverage of security controls in cyber insurance proposal forms
- Publisher: Springer
Journal of Internet Services and Applications,
(issn: 1867-4828, eissn: 1869-0238)
Computer engineering. Computer hardware | Q | SANS20 controls | Security controls | T | Business security | ISO/IEC 27000 series | TK5101-6720 | Telecommunication | Cyber insurance | TK7885-7895 | HG
Abstract Policy discussions often assume that wider adoption of cyber insurance will promote information security best practice. However, this depends on the process that applicants need to go through to apply for cyber insurance. A typical process would require an appl...