Cyber Insurance News & Information Podcast

Cyber Insurance News & Information

The leading pure-play source for cybersecurity insurance news, insights and data, Cyber Insurance News (CIN) is produced by a team of award-winning journalists with decades of reporting experience, along with deep cyber and financial expertise and networks. Martin Hinton is your host and the Executive Editor of Cyber Insurance News. He is an award-winning journalist and storyteller with broad experience and a proven ability to distill complex ideas into compelling and impactful narratives across video, print, and digital media

  1. Non-Human Identity Risks: Permissions, AI Agents, and Hidden Access

    2D AGO

    Non-Human Identity Risks: Permissions, AI Agents, and Hidden Access

    Non-human identity risk is exploding; bots, service accounts, apps, automations, and AI agents that can outnumber humans by 45:1. In this Cyber Insurance News and Information podcast episode, Martin Hinton talks with Marshall Sorensen (Myriad360) about why permissions sprawl creates cyber insurance, third-party, and breach exposure, and what governance looks like in practice. In this episode, you’ll learn: What a non-human identity is and where it hides Why “Allow access” turns automation into risk How attackers exploit tokens and over-permissioned tools Monitoring, lifecycle control, and incident response basics What insurers and insureds should ask for next Non-human identities power modern business, but unmanaged permissions create invisible pathways into data, systems, and vendors. This conversation breaks down practical controls for inventory, least privilege, and monitoring to help teams reduce breach likelihood and improve insurability. Chapters 00:00 Introduction to Non-Human Identities 01:04 What Are Non-Human Identities? 02:36 Encountering Non-Human Identities Daily 04:14 Scale and Impact of Non-Human Identities 07:44 Myriad360 and Identity Management 12:00 Examples of Non-Human Identities in Use 15:14 Permissions and Transition to Digital Identity 23:53 Turnstiles and Permission Delegation 27:33 Liability and Security Risks of Automation 34:24 Managing Permissions and Access Control 43:46 The Role of AI and Permissions 57:28 Cyber Attacks Exploiting Non-Human Identities 01:09:31 Monitoring and Incident Response 01:16:23 Future Outlook and AI’s Role in Security 01:20:01 Building a Security Culture 01:20:52 Final Thoughts and Advice

    1h 22m
  2. FEB 13

    Cyber Insurance News Podcast: The High-Vis Jacket Attack + 3 Essential Controls

    Cyber insurance news podcast host Martin Hinton speaks with Glen Williams, CEO of Cyberfort, about how cyber incidents really start and why the human factor still drives many losses. They open with the “high vis jacket attack,” then unpack trust, access, and the common misconception that IT management equals cybersecurity capability. Glen explains Cyberfort’s end-to-end approach, why 24/7 monitoring matters, and how teams spot anomalies before they become claims. They also discuss AI as a tool for both defenders and attackers, the growing impact of cybercrime on SMEs, and the difference between Cyber Essentials compliance and real resilience. Glen closes with three practical controls for mid-market firms: staff training, multi-factor authentication, and an analog backup solution for communication during an incident. In this episode: Social engineering • Human factor • Continuous monitoring • AI risk • SMEs • Cyber Essentials • Cyber insurance • Resilience Takeaways The high vis jacket attack illustrates the ease of gainingaccess to secure areas through social engineering.Cybersecurity is not just a technical issue; it involveshuman behavior and trust.Organizations often confuse IT management with cybersecurityexpertise, leading to vulnerabilities.Continuous monitoring is essential for effectivecybersecurity management.Cyber Essentials is a basic standard, but organizations needto go beyond compliance to ensure security.The human element in cybersecurity is crucial; trainingstaff can prevent breaches.AI is a double-edged sword in cybersecurity, used by bothdefenders and attackers.Cybercrime has a significant economic impact, costing theglobal economy trillions.SMEs are particularly vulnerable to cyber attacks but oftenlack the resources to defend against them.Having an analog backup solution is vital for communication during a cyber incident.Chapters 00:00 Introduction to Glen Williams CEO of Cyberfort02:18 The High Vis Jacket Attack: A Lesson in Trust02:58 Glenn Williams' Background and Cyberfort's Mission04:51 Identifying Market Opportunities in Cybersecurity07:27 Cyberfort's Target Market: Mid-Market Organizations08:22 End-to-End Cybersecurity Services Explained10:11 The Doctor Analogy: Cybersecurity Health Checks11:58 Misconceptions About IT and Cybersecurity15:16 The Importance of 24/7 Cyber Monitoring18:59 The Role of Humans vs. AI in Cybersecurity21:16 The Impact of Cyber Attacks on SMEs24:24 Government Response to Cybersecurity Breaches28:29 The UK's Cybersecurity Landscape and Regulations32:41 Cyber Essentials: Compliance vs. Security36:57 The Importance of Testing Cybersecurity Measures38:20 The Illusion of More: Cybersecurity Spending andVulnerability39:29 The Human Element: Understanding Cybersecurity Mindsets40:25 The Psychology of Cybercrime: Human Manipulation and Vulnerability41:14 The Importance of Awareness: Protecting Digital Spaces44:49 Speed vs. Safety: The Need for Caution in DigitalTransactions46:14 Generational Trust: The Impact of Age on Cybersecurity Awareness48:14 Raising Awareness: The Need for Education inCybersecurity51:45 Cyber Insurance: A Safety Net for DigitalVulnerabilities54:10 The Role of Cyber Insurance in Business Resilience56:52 The Buyer’s Market: Cybersecurity as an Investment59:53 AI and Cybersecurity: The Need for Policies andGuardrails01:02:29 The Jigsaw Puzzle: How Small Details Can Lead to Breaches01:06:33 Three Essential Controls for Mid-Market Companies01:10:30 Cultural Differences in Cybersecurity Awareness

    1h 13m
  3. Cyber Insurance Gaps: How 831(b) Helps When Claims Don’t Pay

    JAN 30

    Cyber Insurance Gaps: How 831(b) Helps When Claims Don’t Pay

    Insurance is supposed to catch you on the worst day. The worst day gets worse when the claim doesn’t pay. Cyber Insurance keeps tightening. Underwriting questionnaires keep growing. Coverage can hinge on procedures, controls, and fine print. In this episode of The Cyber Insurance News & Information Podcast, Executive Editor Martin Hinton speaks with Dustin Carlson, President of SRA 831(b) Admin. Carlson explains how 831(b) structures can help businesses plan for losses that fall outside the coverage of cyber Insurance. Think exclusions, sub-limits, deductibles, and business interruption that lasts longer than the policy expects. They also dig into the threat landscape, hitting small businesses. Cybercrime operates like an organized business. Social engineering exploits urgency and trust. Ransomware pressure campaigns drive disruption. Business email compromise and wire fraud continue to grow. Third-party outages can shut operations down even when you did everything “right.” If you want a clearer view of what Cyber Insurance covers, where it can fail, and how 831(b) may help fill gaps, this episode is for you. Chapters 00:00 Introduction And 831(b) Plans 01:28 Understanding 831(b): A Rainy Day Fund For Businesses 06:35 The Role Of 831(b) In Cyber Insurance 11:23 Navigating Cyber Insurance: Common Misconceptions 16:21 The Evolving Landscape Of Cyber Insurance 21:29 The Importance Of Understanding Your Insurance Policy 26:24 The Growing Threat Of Cyber Crime 28:50 The Illusion Of Safety In Cybersecurity 30:26 Understanding Ransomware Payments And Reporting 33:17 The Organized Nature Of Cybercrime 35:50 Social Engineering: The Human Element Of Cybersecurity 38:20 Third-Party Dependencies And Business Interruptions 45:53 Business Email Compromise: A Growing Threat 54:38 Reframing Cybersecurity And Cyber Insurance Business Continuity Takeaways 831(b) plans serve as a tax-deferred rainy day fund for businesses.Traditional cyber insurance often has significant exclusions.Small businesses are prime targets for cyber attacks.Proactive risk management is essential for business continuity.Ransomware payments often go unreported, complicating risk assessment.Business email compromise is a growing threat to companies.Understanding your insurance policy is crucial to avoid gaps in coverage.Cyber threats are constantly evolving, requiring ongoing vigilance.Third-party dependencies can lead to unexpected business interruptions.Training employees on cybersecurity procedures is vital for protection.

    1h 2m
  4. Cyber Risk In 2026: AI Deepfakes, Cybercrime Scale, And Cyber Insurance Pressure

    JAN 23

    Cyber Risk In 2026: AI Deepfakes, Cybercrime Scale, And Cyber Insurance Pressure

    Cyber risk in 2026 is accelerating as AI reshapes fraud and cybercrime. In this episode of the Cyber Insurance News and Information Podcast, host Martin Hinton speaks with Jason Makevich, founder and CEO of Greenlight Cyber and founder of PORT1. They outline what SMB leaders and MSPs should expect from deepfakes, scaled ransomware tactics, and third-party exposure. Jason shares a proof-first mindset for modern trust. He explains practical controls that reduce loss without huge spending. The conversation also connects incident reporting and better data intelligence to the pressure on cyber insurance underwriting. If you track cyber risk in 2026, this episode offers clear steps you can apply this week. Find Jason Greenlight Cyber PORT1 Liminal Takeaways Cybersecurity is essential for small and medium-sizedbusinesses.AI is transforming the cybersecurity landscape, but it alsoposes new risks.Organizations must take proactive steps to mitigate cyberrisks.Data governance is crucial when using AI tools.Supply chain risks are a significant concern incybersecurity.Legislation is evolving to address cybersecurity challenges.Cybercrime is increasingly organized and sophisticated.Trust but verify is no longer sufficient; don't trust atall.The majority of organizations are not adequately protectedagainst cyber threats.A major cybersecurity incident is likely to occur in thenear future.Chapters 00:00 Introduction to Cybersecurity and MSPs 03:00 The Evolution of Cybersecurity Needs 05:52 The Impact of AI on Cybersecurity 08:47 Understanding Cyber Risk and Leadership 11:36 The Role of History in Cybersecurity 14:56 The Scale of Cybercrime and Its Consequences 17:38 Mandatory Reporting and Cybercrime Awareness 20:39 The Responsibility of Businesses in Cybersecurity 23:51 The Misconception of Cybersecurity Risks 26:26 Supply Chain and Third-Party Risks 29:16 The Need for Secure Design in Technology 32:25 The Human Element in Cybersecurity 35:32 Conclusion and Future Outlook 41:14 Understanding Cyber Crime Today 45:31 The Geopolitical Landscape of Cyber Crime 49:29 The Rise of Deepfakes and Trust Issues 53:37 Trust but Verify: A New Approach to Security 58:37 Basic Security Practices for Small Businesses 01:01:46 Finding the Right Cybersecurity Partner 01:06:42 AI Governance and Data Security 01:15:45 Predictions

    1h 19m
  5. Cyber Insurance Market Reality Check: MFA, Validation, And Social Engineering - With Max Perkins of Spektrum Labs

    JAN 16

    Cyber Insurance Market Reality Check: MFA, Validation, And Social Engineering - With Max Perkins of Spektrum Labs

    The Cyber Insurance Market is still maturing. Underwriters want verified controls, consistent security data, and clearer signals of resilience. In this episode of The Cyber Insurance News Podcast, host Martin Hinton speaks with Max Perkins, Head of Insurance Solutions at Spektrum Labs. Perkins explains why cyber insurance applications overwhelm many businesses, why attestations fall apart at claim time, and why data validation matters for underwriting. They also dig into today’s threat landscape, including social engineering and ransomware pressure, plus what Perkins expects next on pricing, talent movement, and control verification. If you buy, sell, or underwrite cyber coverage, this episode delivers practical guidance you can use before renewal. Find Max here Find Spektrum Labs here The Dell Technologies article we discuss Takeaways Cyber resilience is essential for organizations of all sizes.Standardized data is crucial for effective underwriting in cyber insurance.Small businesses often misunderstand the complexities of cyber insurance policies.The threat landscape is evolving, with social engineering becoming more prevalent.Verification of security measures is key to building trust with underwriters. Chapters 00:00 Introduction to Cyber Insurance and Spectrum Labs 02:04 Max Perkins' Journey in Cyber Insurance 09:27 The Current State of Cyber Insurance 14:56 Challenges in the Cyber Insurance Application Process 21:33 Understanding Cyber Insurance for Small Businesses 26:25 The Role of Underwriters in Cyber Insurance 31:14 The Importance of Data Validation 37:05 The Evolving Threat Landscape 56:05 Predictions and Myths in Cyber Insurance

    1h 5m
  6. Incident Response Communications: What to Say After a Cyberattack

    12/19/2025

    Incident Response Communications: What to Say After a Cyberattack

    In this episode, Martin Hinton speaks with Kelly Miller from FTI Consulting about the intricacies of cyber incident response and the critical role of communication during crises. They discuss the importance of establishing processes, understanding stakeholder dynamics, and the human element in crisis management. Kelly emphasizes the need for transparency, effective internal communication, and the value of preparedness through tabletop exercises. The conversation highlights common mistakes organizations make during incidents and the significance of crafting consistent messages while navigating legal and media relations. Takeaways Communication is a risk control, not just PR.Over-promising can lead to loss of trust.Establishing processes is crucial in the first hour.Trust is foundational in crisis management.Preparedness can save money in the long run.Words matter, especially in legal contexts.Transparency is key to maintaining trust.Internal communication must be disciplined.Recovery narratives should reassure customers.Tabletop exercises help build muscle memory."The worst thing is over-promising." "Over-promising sets the wrong tone." "Transparency is crucial for trust." Chapters 00:00 Introduction to Cyber Incident Response 02:52 The First Moments of a Cyber Breach 05:39 The Importance of Communication in Crisis 09:06 Establishing Effective Processes 12:02 Understanding Stakeholder Dynamics 14:59 The Human Element in Crisis Management 17:57 Mapping Stakeholders and Key Messages 20:53 Legal and Insurance Considerations 23:58 Navigating Media Communications 26:45 The Role of Internal Communications 29:46 Maintaining Message Discipline 32:47 Recovery and Future Preparedness 34:18 Crafting a Recovery Narrative 38:28 The Importance of Practice and Preparation 46:30 Tabletop Exercises: The Scrimmage of Crisis Management 56:42 Words Matter: The Impact of Language in Crisis Communication

    1h 1m

Trailers

Ratings & Reviews

5
out of 5
2 Ratings

About

The leading pure-play source for cybersecurity insurance news, insights and data, Cyber Insurance News (CIN) is produced by a team of award-winning journalists with decades of reporting experience, along with deep cyber and financial expertise and networks. Martin Hinton is your host and the Executive Editor of Cyber Insurance News. He is an award-winning journalist and storyteller with broad experience and a proven ability to distill complex ideas into compelling and impactful narratives across video, print, and digital media