REPORT
    Navigating the Emerging Cybersecurity Landscape for Insurers
    Quantum Threats, New Cybersecurity Framework, and Focus on Business Continuity
    12th December 2024

    As digital technologies advance and geopolitical tensions rise, the lines between digital boundaries blur, placing businesses at the forefront of new conflicts. This underscores the urgent need for robust cybersecurity strategies to ensure resilience in a complex and volatile landscape.

    The landscape of cyber threats constantly evolves, from “pig-butchering” and “zombie computers” to sophisticated phishing schemes and ransomware attacks. Pig butchering is a scam in which fraudsters build relationships with their victims over time, often through social media or dating platforms, before ultimately defrauding them of significant sums of money.

    Recent advancements in AI have enabled more sophisticated and automated attack methods, increasing the complexity of the threat landscape. Cybercriminals can now create compelling phishing schemes and generate malicious code at an unprecedented scale. Cyber threats have evolved from the actions of opportunistic hackers to sophisticated state-sponsored attacks targeting critical infrastructure. This evolution marks a shift in the nature and scale of cyber threats.

    Recent advancements in Quantum technology are also amplifying the cyber threat landscape. Quantum computing threatens traditional encryption methods, necessitating the development of quantum-resistant algorithms. Scientists hold differing views on the timeline for the emergence of a powerful quantum computer. Many countries are investing substantial resources into quantum computing research, recognising it as an increasingly vital national priority. This timeline could be further accelerated by the information asymmetry and secrecy surrounding quantum computing developments by certain governments seeking strategic advantage.

    On December 9, 2024, Google unveiled details about its new advanced quantum chip, Willow, designed specifically for demonstration purposes. The company stated that this chip will enhance its current technology, moving closer to practical applications. These advancements underscore the urgent need to implement quantum-safe algorithms without delay.

    Insurance companies encounter distinct challenges in safeguarding their systems and data. Over the years, Celent has published many research reports on cybersecurity to help insurers identify the best practices for implementing preventive measures.

    Date of publication

    Title

    Details covered

    December 2020

    Cyber Threats and Insurance: The Two Sides of the Coin

    Defined cyber threats and identified risks and opportunities they represent for insurers

    February 2021

    Insurers Fight Against Cyber Threats: Preparing for a Long-Lasting War

    Insights from insurers’ recent cyberattack experience and how CIOs can protect against such attacks

    September 2021

    Cyber Opportunities: The Insurer Strikes Back

    A deep dive into opportunities for cyber insurers and the technology ecosystem necessary to manage risk for cyber insurers and their customers

    December 2021

    Cybersecurity Frameworks for Insurers

    Detailed cybersecurity frameworks such as NIST and ISO

    March 2023

    Quantum Computing is Advancing: Insurers Should Prepare

    Highlighted the risks associated with quantum computing on cybersecurity

    Source: Celent

    The aforementioned report continues to be pertinent in tackling cybersecurity threats. This report primarily focuses on recent developments in quantum-safe algorithms and the newly released NIST (National Institute of Standards and Technology) Cybersecurity Framework 2.0.

    Business continuity and operational resilience have become increasingly critical in light of the rising frequency and sophistication of cybersecurity incidents. Organisations are now more vulnerable than ever to cyber threats, which can disrupt operations, compromise sensitive data, and damage reputations. The report also delves into the approach organisations should take in business continuity planning and operational resilience, ensuring that companies can maintain essential functions during and after a cyber event and minimise downtime and financial losses.

    Author
    Karun Arathil
    Karun Arathil
    Senior Analyst