Lunch & Learn | Cyber Insurance: contagion of a cyber attack on a network
We are happy to invite you to participate to our next Lunch & Learn. It will take place on Apr. 19, 2022 from 12:30 to 13:30 (UTC+2).
It will be given in English by our Scientific Director, Olivier Lopez..
The systemic potential of cyber attacks is a matter of concern for the cyber insurance sector. An important issue is then to determine if a portfolio is resilient or not to such events, and potentially to define diversification strategies that may protect the insurer against massive failures of some classes of policyholders.
This Lunch & Learn will present a general framework that allows to model the propagation of a cyber attack on different categories of policyholders, depending on the strength of the digital links between them. We will present some tool developed by Detralytics that allows fast exploration of scenarios depending on the composition of the portfolio, and an analysis of the threat.
The Detralytics Team
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.