Skip to content
Are the requirements for obtaining cyber liability insurance aligned with the recommended best practices approach to combating real-world cyber threats.
*
1.
Token-Based Multi-Factor Authentication is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
2.
Vulnerability Scanning & Patch Management is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
3.
Endpoint Protection & Response is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
4.
E-mail Filtering & Security (DMARC/DKIM) is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
5.
Privileged Access Management is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
6.
Network Segmentation is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
7.
Disaster Recovery Planning and Testing is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
8.
Incident Response Planning and Testing is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
*
9.
End-user Security Awareness Training is necessary to defend cyber systems from real-world threats
(Required.)
Strongly agree
Agree
Neither agree nor disagree
Disagree
Strongly disagree
10.
Years of professional experience