An Analytical Review of Cyber Risk Management by Insurance Companies: A Mathematical Perspective
Abstract
1. Introduction
2. Overview of the State-of-the-Art
3. Brief History of Cyber Risk Quantification
4. Cyber Insurance
4.1. Managing Interdependence in Insurance Regulation
4.2. Cyber Insurance Products
4.3. Cyber Reinsurance
5. Pricing
6. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
1 | The coefficient can also be defined as , see Olivieri and Pitacco (2015). This coefficient coincides with the coefficient introduced by Babcock et al. (1993) when . |
References
- Abou El Houda, Zakaria. 2024. Cyber threat actors review: Examining the tactics and motivations of adversaries in the cyber landscape. In Cyber Security for Next-Generation Computing Technologies. Boca Raton: CRC Press, pp. 84–101. [Google Scholar]
- Adelmann, Frank, Jennifer Elliott, Ibrahim Ergen, Tamas Gaidosch, and Nigel Jenkinson. 2020. Cyber Risk and Financial Stability: It’s a Small World after All. Washington, DC: International Monetary Fund. [Google Scholar]
- Adriko, Rodney, and Jason R. C. Nurse. 2024. Cybersecurity, cyber insurance and small-to-medium-sized enterprises: A systematic review. Information & Computer Security 32: 691–710. [Google Scholar]
- Allianz Commercial. 2025. Allianz Risk Barometer 2025: Identifying the Major Business Risks for 2025. Available online: https://commercial.allianz.com/news-and-insights/reports/allianz-risk-barometer.html (accessed on 2 July 2025).
- Antonio, Yeftanus, Sapto Wahyu Indratno, and Suhadi Wido Saputro. 2021. Pricing of cyber insurance premiums using a markov-based dynamic model with clustering structure. PLoS ONE 16: e0258867. [Google Scholar] [CrossRef] [PubMed]
- Aven, Terje, Yakov Ben-Haim, H. Boje Andersen, Tony Cox, Enrique López Droguett, Michael Greenberg, Seth Guikema, Wolfgang Kröger, Ortwin Renn, Kimberly M. Thompson, and et al. 2018. Society for Risk Analysis Glossary. Herndon: Society for Risk Analysis. [Google Scholar]
- Awiszus, Kerstin, Thomas Knispel, Irina Penner, Gregor Svindland, Alexander Voß, and Stefan Weber. 2023. Modeling and pricing cyber insurance: Idiosyncratic, systematic, and systemic risks. European Actuarial Journal 13: 1–53. [Google Scholar] [CrossRef]
- Babcock, Bruce, Kwan Choi, and Eli Feinerman. 1993. Risk and probability premiums for cara utility functions. Journal of Agricultural and Resource Economics 18: 17–24. [Google Scholar]
- Baer, Walter S., and Andrew Parkinson. 2007. Cyberinsurance in it security management. IEEE Security & Privacy 5: 50–56. [Google Scholar] [CrossRef]
- Ballestra, Luca, D’Amato Valeria, Fersini Paola, Forte Salvatore, and Greco Fedele. 2024. Pricing cyber insurance: A geospatial statistical approach. Applied Stochastic Models in Business and Industry 40: 1365–76. [Google Scholar] [CrossRef]
- Bardopoulos, James. 2025. Cyber-insurance pricing models. British Actuarial Journal 30: e6. [Google Scholar] [CrossRef]
- Barreto, Carlos, Galina Schwartz, and Alvaro A. Cardenas. 2021. Cyber-Insurance. Cham: Springer International Publishing, Chapter 15. pp. 347–75. [Google Scholar] [CrossRef]
- Bolot, Jean, and Marc Lelarge. 2009. Cyber insurance as an incentive for internet security. In Managing Information Risk and the Economics of Security. Cham: Springer, pp. 269–90. [Google Scholar]
- Böhme, Rainer, and Gaurav Kataria. 2006. Models and measures for correlation in cyber-insurance. Weis 2: 3. [Google Scholar]
- Bühlmann, Hans. 1970. Premium calculation. Mathematical Methods in Risk Theory, 85–110. [Google Scholar]
- Callegaro, Giorgia, Claudio Fontana, Caroline Hillairet, and Beatrice Ongarato. 2025. A stochastic gordon-loeb model for optimal cybersecurity investment under clustered attacks. arXiv arXiv:2505.01221. [Google Scholar] [CrossRef]
- Carannante, Maria, Valeria D’Amato, Paola Fersini, Salvatore Forte, and Giuseppe Melisi. 2023. Vine copula modeling dependence among cyber risks: A dangerous regulatory paradox. Applied Stochastic Models in Business and Industry 39: 549–66. [Google Scholar]
- Carfora, Maria Francesca, Fabio Martinelli, and Francesco Mercaldo. 2019. Cyber risk management: An actuarial point of view. Journal of Operational Risk 14: 77–103. [Google Scholar] [CrossRef]
- Cherubini, Umberto. 2024. Multivariate security breach probability: The gordon-loeb model with copulas. Paper presented at International Conference on Computer Safety, Reliability, and Security, Florence, Italy, September 17; pp. 257–65. [Google Scholar]
- Chong, Wing Fung, Daniël Linders, Zhiyu Quan, and Linfeng Zhang. 2025a. Incident-specific cyber insurance. ASTIN Bulletin: The Journal of the IAA 55: 395–425. [Google Scholar] [CrossRef]
- Chong, Wing Fung, Runhuan Feng, Hins Hu, and Linfeng Zhang. 2025b. Cyber risk assessment for capital management. Journal of Risk and Insurance 92: 424–71. [Google Scholar] [CrossRef]
- Cremer, Frank, Barry Sheehan, Martin Mullins, Michael Fortmann, Stefan Materne, and Finbarr Murphy. 2024. Enhancing cyber insurance strategies: Exploring reinsurance and alternative risk transfer approaches. Journal of Cybersecurity 10: tyae027. [Google Scholar] [CrossRef]
- Cremer, Frank, Barry Sheehan, Michael Fortmann, Arash N Kia, Martin Mullins, Finbarr Murphy, and Stefan Materne. 2022. Cyber risk and cybersecurity: A systematic review of data availability. The Geneva Papers on Risk and Insurance. Issues and Practice 47: 698. [Google Scholar] [CrossRef]
- Dacorogna, Michel, and Marie Kratz. 2023. Managing cyber risk, a science in the making. Scandinavian Actuarial Journal 2023: 1000–21. [Google Scholar] [CrossRef]
- Dacorogna, Michel, Nehla Debbabi, and Marie Kratz. 2023. Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data. European Journal of Operational Research 311: 708–29. [Google Scholar] [CrossRef]
- Dubois, Thomas, Caner Keskin, and Ufuk Tatar. 2022. Cyber Risk Modeling and Datasets: A Systematic Interdisciplinary Literature Review for Actuaries. Society of Actuaries Research Report. Available online: https://www.soa.org/4a81c2/globalassets/assets/files/resources/research-report/2022/cyber-risk-modeling.pdf (accessed on 2 July 2025).
- Dunne, Jonathan, and David Malone. 2017. Obscured by the cloud: A resource allocation framework to model cloud outage events. Journal of Systems and Software 131: 218–29. [Google Scholar] [CrossRef]
- Edwards, Benjamin, Steven Hofmeyr, and Stephanie Forrest. 2016. Hype and heavy tails: A closer look at data breaches. Journal of Cybersecurity 2: 3–14. [Google Scholar] [CrossRef]
- Eling, Martin. 2020. Cyber risk research in business and actuarial science. European Actuarial Journal 10: 303–33. [Google Scholar] [CrossRef]
- Eling, Martin, and Kwangmin Jung. 2018. Copula approaches for modeling cross-sectional dependence of data breach losses. Insurance: Mathematics and Economics 82: 167–80. [Google Scholar] [CrossRef]
- Eling, Martin, and Werner Schnell. 2020. Capital requirements for cyber risk and cyber risk insurance: An analysis of solvency ii, the us risk-based capital standards, and the swiss solvency test. North American Actuarial Journal 24: 370–92. [Google Scholar] [CrossRef]
- Eling, Martin, Michael McShane, and Trung Nguyen. 2021. Cyber risk management: History and future research directions. Risk Management and Insurance Review 24: 93–125. [Google Scholar] [CrossRef]
- Eling, Martin, Rustam Ibragimov, and Dingchen Ning. 2024. The Changing Landscape of Cyber Risk: An Empirical Analysis of Frequency, Severity, and Tail Dynamics. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5158032 (accessed on 1 July 2025).
- European Commission. 2015. Commission Delegated Regulation (Eu): Supplementing Directive 2009/138/ec of the European Parliament and of the Council on the Taking-Up and Pursuit of the Business of Insurance and Reinsurance (Solvency II). Commission Delegated Regulation. Ispra: European Commission. [Google Scholar]
- European Insurance and Occupational Pensions Authority. 2014. The Underlying Assumptions in the Standard Equation for the Solvency Capital Requirement Calculation. EIOPA-14-322. Available online: https://register.eiopa.europa.eu/regulation-supervision/insurance/solvency-ii/solvency-ii-technical-specifications (accessed on 20 June 2025).
- European Insurance and Occupational Pensions Authority. 2018. Understanding Cyber Insurance: A Structured Dialogue with Insurance Companies. Technical Report. Luxembourg: EIOPA. [Google Scholar] [CrossRef]
- European Insurance and Occupational Pensions Authority. 2019. Cyber Risk for Insurers: Challenges and Opportunities. Luxembourg: Publications Office of the European Union. [Google Scholar] [CrossRef]
- European Insurance and Occupational Pensions Authority. 2023. Methodological Principles of Insurance Stress Testing—Cyber Component. Technical Report EIOPA(2023)0087508. Frankfurt: EIOPA. [Google Scholar]
- Farkas, Sébastien, Olivier Lopez, and Maud Thomas. 2021. Cyber claim analysis using generalized pareto regression trees with applications to insurance. Insurance: Mathematics and Economics 98: 92–105. [Google Scholar] [CrossRef]
- Franke, Ulrik. 2017. The cyber insurance market in sweden. Computers & Security 68: 130–44. [Google Scholar] [CrossRef]
- Franke, Ulrik, and Albina Orlando. 2025. Interdependent cyber risk and the role of insurers. Research in Economics 79: 101059. [Google Scholar] [CrossRef]
- Gao, Xing, Weijun Zhong, and Shue Mei. 2015. Security investment and information sharing under an alternative security breach probability function. Information Systems Frontiers 17: 423–38. [Google Scholar] [CrossRef]
- Georgescu, Tiberiu-Marian. 2021. A study on how the pandemic changed the cybersecurity landscape. Informatica Economica 25: 42–60. [Google Scholar] [CrossRef]
- Ghelani, Diptiben. 2022. Cyber security, cyber threats, implications and future perspectives: A review. Authorea Preprints. [Google Scholar] [CrossRef]
- Gordon, Lawrence A., and Martin P. Loeb. 2002. The economics of information security investment. ACM Transactions on Information and System Security (TISSEC) 5: 438–57. [Google Scholar] [CrossRef]
- Gordon, Lawrence A., Martin P. Loeb, and Lei Zhou. 2016. Investing in Cybersecurity: Insights from the Gordon-Loeb Model. Journal of Information Security 7: 49. [Google Scholar] [CrossRef]
- Gordon, Lawrence A., Martin P. Loeb, and Lei Zhou. 2020. Integrating cost–benefit analysis into the nist cybersecurity framework via the gordon–loeb model. Journal of Cybersecurity 6: tyaa005. [Google Scholar] [CrossRef]
- Gordon, Lawrence A., Martin P. Loeb, William Lucyshyn, and Lei Zhou. 2014. Externalities and the magnitude of cyber security underinvestment by private sector firms: A modification of the Gordon-Loeb model. Journal of Information Security 6: 24. [Google Scholar] [CrossRef]
- Hausken, Kjell. 2006. Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Information Systems Frontiers 8: 338–49. [Google Scholar] [CrossRef]
- He, Rong, Zhuo Jin, and Johnny Siu-Hang Li. 2024. Modeling and management of cyber risk: A cross-disciplinary review. Annals of Actuarial Science 18: 270–309. [Google Scholar] [CrossRef]
- Herath, Hemantha, and Tejaswini Herath. 2007. Cyber-insurance: Copula pricing framework and implication for risk management. In WEIS. University Park: Citeseer. [Google Scholar]
- Herath, Hemantha, and Tejaswini Herath. 2011. Copula-based actuarial model for pricing cyber-insurance policies. Insurance Markets and Companies: Analyses and Actuarial Computations 2: 7–20. [Google Scholar]
- Huang, C. Derrick, and Ravi S. Behara. 2013. Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints. International Journal of Production Economics 141: 255–68. [Google Scholar] [CrossRef]
- Kaas, Rob, Marc Goovaerts, Jan Dhaene, and Michel Denuit. 2008. Premium principles and risk measures. Modern Actuarial Risk Theory: Using R, 115–34. [Google Scholar]
- Kesan, Jay P., Rupterto P. Majuca, and William J. Yurcik. 2004. The Economic Case for Cyberinsurance. Technical Report 2. Champaign: University of Illinois College of Law. [Google Scholar]
- Kröger, Wolfgang. 2008. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools. Reliability Engineering & System Safety 93: 1781–87. [Google Scholar] [CrossRef]
- Krutilla, Kerry, Alexander Alexeev, Eric Jardine, and David Good. 2021. The benefits and costs of cybersecurity risk reduction: A dynamic extension of the gordon and loeb model. Risk Analysis 41: 1795–808. [Google Scholar] [CrossRef]
- Kuper, Gabriel, Fabio Massacci, Woohyun Shim, and Julian Williams. 2020. Who should pay for interdependent risk? policy implications for security interdependence among airports. Risk Analysis 40: 1001–19. [Google Scholar] [CrossRef]
- Lallie, Harjinder Singh, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, and Xavier Bellekens. 2021. Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Computers & Security 105: 102248. [Google Scholar]
- Lau, Pikkin, Lingfeng Wang, Zhaoxi Liu, Wei Wei, and Chee-Wooi Ten. 2021. A coalitional cyber-insurance design considering power system reliability and cyber vulnerability. IEEE Transactions on Power Systems 36: 5512–24. [Google Scholar] [CrossRef]
- Lau, Pikkin, Wei Wei, Lingfeng Wang, Zhaoxi Liu, and Chee-Wooi Ten. 2020. A cybersecurity insurance model for power system reliability considering optimal defense resource allocation. IEEE Transactions on Smart Grid 11: 4403–14. [Google Scholar] [CrossRef]
- Lin, Zhaoxin, Travis Sapp, Rahul Parsa, Jackie Rees Ulmer, and Chengxin Cao. 2018. Pricing cyber security insurance. Journal of Mathematical Finance 12. [Google Scholar] [CrossRef]
- Lopez, Olivier, Michel Denuit, Mario Ghossoub, Julien Trufin, Justin Kher, Arthur Maillart, Elisabeth Raes, Hugo Rapior, Mohammed-Amine Skoubani, and Brieuc Spoorenberg. 2025. June. Cyber Risk: Quantification, Stress Scenarios, Mitigation, and Insurance. Available online: https://www.casact.org/article/new-research-offers-breakthrough-cyber-risk-quantification-insurance-industry (accessed on 25 June 2025).
- Maglaras, Leandros A., Ki Hyung Kim, Helge Janicke, Mohamed Amine Ferrag, Stylianos Rallis, Pavlina Fragkou, Athanasios Maglaras, and Tiago J. Cruz. 2018. Cyber security of critical infrastructures. ICT Express 4: 42–45. [Google Scholar] [CrossRef]
- Maillart, Thomas, and Didier Sornette. 2010. Heavy-tailed distribution of cyber-risks. The European Physical Journal B 75: 357–64. [Google Scholar] [CrossRef]
- Marotta, Angelica, Fabio Martinelli, Stefano Nanni, Albina Orlando, and Artsiom Yautsiukhin. 2017. Cyber-insurance survey. Computer Science Review 24: 35–61. [Google Scholar] [CrossRef]
- Mastroeni, Loretta, Alessandro Mazzoccoli, and Maurizio Naldi. 2019. Service level agreement violations in cloud storage: Insurance and compensation sustainability. Future Internet 11: 142. [Google Scholar] [CrossRef]
- Mastroeni, Loretta, Alessandro Mazzoccoli, and Maurizio Naldi. 2022. Pricing cat bonds for cloud service failures. Journal of Risk and Financial Management 15: 463. [Google Scholar] [CrossRef]
- Matsuura, Kanta. 2008. Productivity space of information security in an extension of the gordon-loeb’s investmentmodel. In Managing Information Risk and the Economics of Security. Cham: Springer, pp. 99–119. [Google Scholar]
- Mayadunne, Sanjaya, and Sungjune Park. 2016. An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics 182: 519–30. [Google Scholar] [CrossRef]
- Mazzoccoli, Alessandro, and Maurizio Naldi. 2020a. Robustness of optimal investment decisions in mixed insurance/investment cyber risk management. Risk Analysis 30: 550–64. [Google Scholar] [CrossRef]
- Mazzoccoli, Alessandro, and Maurizio Naldi. 2020b. The expected utility insurance premium principle with fourth-order statistics: Does it make a difference? Algorithms 13: 116. [Google Scholar] [CrossRef]
- Mazzoccoli, Alessandro, and Maurizio Naldi. 2021. Optimal investment in cyber-security under cyber insurance for a multi-branch firm. Risks 9: 24. [Google Scholar] [CrossRef]
- Mazzoccoli, Alessandro, and Maurizio Naldi. 2022a. An overview of security breach probability models. Risks 10: 220. [Google Scholar] [CrossRef]
- Mazzoccoli, Alessandro, and Maurizio Naldi. 2022b. Optimizing cybersecurity investments over time. Algorithms 15: 211. [Google Scholar] [CrossRef]
- Mukhopadhyay, Arunabha, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, and Samir K. Sadhukhan. 2013. Cyber-risk decision models: To insure it or not? Decision Support Systems 56: 11–26. [Google Scholar] [CrossRef]
- Mukhopadhyay, Arunabha, Samir Chatterjee, Kallol K. Bagchi, Peteer J. Kirs, and Girja K. Shukla. 2019. Cyber risk assessment and mitigation (cram) framework using logit and probit models for cyber insurance. Information Systems Frontiers 21: 997–1018. [Google Scholar] [CrossRef]
- Munk, Tine. 2022. The Rise of Politically Motivated Cyber Attacks: Actors, Attacks and Cybersecurity. London: Routledge. [Google Scholar]
- Mupa, Munashe Naphtali, Sylvester Tafirenyika, Melody Rudaviro, Tamuka Nyajeka, Mavenge Moyo, and Eliel Kundai Zhuwankinyu. 2025. Machine learning in actuarial science: Enhancing predictive models for insurance risk management. Iconic Research and Engineering Journals 8: 493–504. [Google Scholar]
- Naldi, Maurizio, and Alessandro Mazzoccoli. 2018. Computation of the insurance premium for cloud services based on fourth-order statistics. International Journal of Simulation: Systems, Science and Technology 19: 1–6. [Google Scholar] [CrossRef]
- Novo, Carolina Cardoso, Mirian Picinini Méxas, and Lidia Angulo Meza. 2025. Applications of cyber insurance in smart cities: A systematic literature review. International Journal of Information Security 24: 93. [Google Scholar] [CrossRef]
- Olivieri, Annamaria, and Ermanno Pitacco. 2015. Introduction to Insurance Mathematics: Technical and Financial Features of Risk Transfers. Cham: Springer. [Google Scholar]
- Organisation for Economic Co-Operation and Development. 2017. Enhancing the Role of Insurance in Cyber Risk Management. Technical Report. Paris: OECD. [Google Scholar]
- Organisation for Economic Co-Operation and Development. 2020. Encouraging Clarity in Cyber Insurance Coverage. The Role of Public Policy and Regulation. Technical Report. Paris: OECD. [Google Scholar]
- Pal, Ranjan, Konnie Duan, and Rohan Sequeira. 2025. A theory to estimate, bound, and manage systemic cyber-risk. Paper presented at the 39th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, Santa Fe, NM, USA, June 23–26; pp. 70–80. [Google Scholar] [CrossRef]
- Pal, Ranjan, Leana Golubchik, Konstantinos Psounis, and Pan Hui. 2014. Will cyber-insurance improve network security? A market analysis. Paper presented at the INFOCOM, 2014 Proceedings IEEE, Toronto, ON, Canada, April 27–May 2; pp. 235–43. [Google Scholar]
- Palsson, Kjartan, Steinn Gudmundsson, and Sachin Shetty. 2020. Analysis of the impact of cyber events for cyber insurance. The Geneva Papers on Risk and Insurance-Issues and Practice 45: 564–79. [Google Scholar] [CrossRef]
- Peng, Chen, Maochao Xu, Shouhuai Xu, and Taizhong Hu. 2018. Modeling multivariate cybersecurity risks. Journal of Applied Statistics 45: 2718–40. [Google Scholar] [CrossRef]
- Peters, Gareth, Pavel V. Shevchenko, Ruben D. Cohen, and Diane Maurice. 2017. Statistical Machine Learning Analysis of Cyber Risk Data: Event Case Studies. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3200155 (accessed on 18 June 2025).
- Pollmeier, Santiago, Ivano Bongiovanni, and Sergeja Slapničar. 2023. Designing a financial quantification model for cyber risk: A case study in a bank. Safety Science 159: 106022. [Google Scholar] [CrossRef]
- Rabitti, Giovanni, Amir Khorrami Chokami, Patrick Coyle, and Ruben D Cohen. 2025. A taxonomy of cyber risk taxonomies. Risk Analysis 45: 376–86. [Google Scholar] [CrossRef]
- Rangu, Călin Mihail, Leonardo Badea, Mircea Constantin Scheau, Larisa Găbudeanu, Iulian Panait, and Valentin Radu. 2024. Cyber insurance risk analysis framework considerations. The Journal of Risk Finance 25: 224–52. [Google Scholar] [CrossRef]
- Ratnawat, Chetan Prakash. 2025. Revolutionizing cyber insurance: Ai-driven risk scorecards for smes. Journal Of Multidisciplinary 5: 27–37. [Google Scholar] [CrossRef]
- Romanosky, Sasha, Lilian Ablon, Andreas Kuehn, and Therese Jones. 2019. Content analysis of cyber insurance policies: How do carriers write policies and price cyber risk? Journal of Cybersecurity 5: tyz002. [Google Scholar] [CrossRef]
- Shetty, Nikhil, Galina Schwartz, Mark Felegyhazi, and Jean Walrand. 2010. Competitive cyber-insurance and internet security. In Economics of Information Security and Privacy. Cham: Springer, pp. 229–47. [Google Scholar] [CrossRef]
- Skeoch, Henry R. K. 2022. Expanding the gordon-loeb model to cyber-insurance. Computers & Security 112: 102533. [Google Scholar] [CrossRef]
- Smith, Zhanna Malekos, and Eugenia Lostri. 2020. The Hidden Costs of Cybercrime. Technical Report. Santa Clara: McAfee. [Google Scholar]
- Sobchuk, Valentyn, Oleg Barabash, Andrii Musienko, Iryna Tsyganivska, and Oleksandr Kurylko. 2023. Mathematical model of cyber risks management based on the expansion of piecewise continuous analytical approximation functions of cyber attacks in the fourier series. Axioms 12: 924. [Google Scholar] [CrossRef]
- Strupczewski, Grzegorz. 2019. What is the worst scenario? modeling extreme cyber losses. Paper presented at the Multiple Perspectives in Risk and Risk Management: ERRN 8th European Risk Conference 2018, Katowice, Poland, September 20–21; Cham: Springer, pp. 211–30. [Google Scholar]
- Strzelczyk, Wojciech, and Karolina Puławska. 2025. Unraveling the role of cyber insurance in fortifying organizational cybersecurity. MIS Quarterly Executive 24: 35–45. [Google Scholar] [CrossRef]
- Sun, Hong, Maochao Xu, and Peng Zhao. 2021. Modeling malicious hacking data breach risks. North American Actuarial Journal 25: 484–502. [Google Scholar] [CrossRef]
- Taherdoost, Hamed. 2022. Understanding cybersecurity frameworks and information security standards—A review and comprehensive overview. Electronics 11: 2181. [Google Scholar] [CrossRef]
- Tsohou, Aggeliki, Vasiliki Diamantopoulou, Stefanos Gritzalis, and Costas Lambrinoudakis. 2023. Cyber insurance: State of the art, trends and future directions. International Journal of Information Security 22: 737–48. [Google Scholar] [CrossRef]
- Venkatachary, Sampath Kumar, Jagdish Prasad, and Ravi Samikannu. 2017. Economic impacts of cyber security in energy sector: A review. International Journal of Energy Economics and Policy 7: 250–62. [Google Scholar]
- Wang, Shaun. 2017. Optimal Level and Allocation of Cybersecurity Spending: Model and Formula. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3010029 (accessed on 10 June 2025).
- Wang, Shaun S. 2019. Integrated framework for information security investment and cyber insurance. Pacific-Basin Finance Journal 57: 101173. [Google Scholar] [CrossRef]
- Weber, Stefan, Matthias Scherer, Corina Pascu, and Marco Barros Lourenco. 2024. Cyber Insurance—Models and Methods and the Use of AI. Technical Report. Athens: European Union Agency for Cybersecurity. [Google Scholar] [CrossRef]
- Weisman, Michael J., Alexander Kott, Jason E. Ellis, Brian J. Murphy, Travis W. Parker, Sidney Smith, and Joachim Vandekerckhove. 2025. Quantitative measurement of cyber resilience: Modeling and experimentation. ACM Transactions on Cyber-Physical Systems 9: 1–25. [Google Scholar] [CrossRef]
- Wheatley, Spencer, Thomas Maillart, and Didier Sornette. 2016. The extreme risk of personal data breaches and the erosion of privacy. The European Physical Journal B 89: 1–12. [Google Scholar] [CrossRef]
- Woods, Daniel W., and Josephine Wolff. 2025. A history of cyber risk transfer. Journal of Cybersecurity 11: tyae028. [Google Scholar] [CrossRef]
- Xiang, Qikun, Ariel Neufeld, Gareth W Peters, Ido Nevat, and Anwitaman Datta. 2024. A bonus-malus framework for cyber risk insurance and optimal cybersecurity provisioning. European Actuarial Journal 14: 581–621. [Google Scholar] [CrossRef]
- Xu, Lu, Yanhui Li, and Jing Fu. 2019. Cybersecurity investment allocation for a multi-branch firm: Modeling and optimization. Mathematics 7: 587. [Google Scholar] [CrossRef]
- Xu, Maochao, and Lei Hua. 2019. Cybersecurity insurance: Modeling and pricing. North American Actuarial Journal 23: 220–49. [Google Scholar] [CrossRef]
- Xu, Maochao, Kristin M. Schweitzer, Raymond M. Bateman, and Shouhuai Xu. 2018. Modeling and predicting cyber hacking breaches. IEEE Transactions on Information Forensics and Security 13: 2856–71. [Google Scholar]
- Yang, Zichao, and John CS Lui. 2014. Security adoption and influence of cyber-insurance markets in heterogeneous networks. Performance Evaluation 74: 1–17. [Google Scholar] [CrossRef]
- Young, Derek, Juan Lopez, Mason Rice, Benjamin Ramsey, and Robert McTasney. 2016. A framework for incorporating insurance in critical infrastructure cyber risk strategies. International Journal of Critical Infrastructure Protection 14: 43–57. [Google Scholar] [CrossRef]
- Zängerle, Daniel, and Dirk Schiereck. 2023. Modelling and predicting enterprise-level cyber risks in the context of sparse data availability. The Geneva Papers on Risk and Insurance-Issues and Practice 48: 434–62. [Google Scholar] [CrossRef]
- Zeller, Gabriela, and Matthias Scherer. 2022. A comprehensive model for cyber risk based on marked point processes and its application to insurance. European Actuarial Journal 12: 33–85. [Google Scholar] [CrossRef]
- Zraqou, Jamal, Khalil Omar, and Jawad H. Alkhateeb. 2025. The evolution of cyber insurance in response to artificial intelligence risks. In Cybersecurity Insurance Frameworks and Innovations in the AI Era. Hershey: IGI Global. [Google Scholar] [CrossRef]
Vulnerability Function | Mathematical Formulation |
---|---|
Function 1 | |
Function 2 | |
Function 3 | |
Function 4–6 | or or |
Function 7 | |
Function 8 | |
Function 9 |
Principle | Mathematical Formulation |
---|---|
Expected value premium | |
Mean-variance premium | |
Standard deviation premium | |
Fourth order statistics | |
Tail Value-at-Risk premium |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Carannante, M.; Mazzoccoli, A. An Analytical Review of Cyber Risk Management by Insurance Companies: A Mathematical Perspective. Risks 2025, 13, 144. https://doi.org/10.3390/risks13080144
Carannante M, Mazzoccoli A. An Analytical Review of Cyber Risk Management by Insurance Companies: A Mathematical Perspective. Risks. 2025; 13(8):144. https://doi.org/10.3390/risks13080144
Chicago/Turabian StyleCarannante, Maria, and Alessandro Mazzoccoli. 2025. "An Analytical Review of Cyber Risk Management by Insurance Companies: A Mathematical Perspective" Risks 13, no. 8: 144. https://doi.org/10.3390/risks13080144
APA StyleCarannante, M., & Mazzoccoli, A. (2025). An Analytical Review of Cyber Risk Management by Insurance Companies: A Mathematical Perspective. Risks, 13(8), 144. https://doi.org/10.3390/risks13080144