If your defences are breached, we’ll help you get back to business as usual
Data leaks and data losses can lead to regulatory fines and PR nightmares, while attacks could lead to shut-down servers and loss of both confidence and profits. AIG understands this and provides a package of protection that includes insurance and specialist advice.
Our CyberEdge Breach Response Team will access information assurance experts as well as a leading law firm to offer consultancy that can respond in a crisis and help our clients take the best course of action.
This includes data administrative investigations and fines from data protection regulators that are insurable at law.
Cyber incident response services include PR repair of company and individual reputations, breach coaching and any breach of information notification and monitoring costs.
This includes data restoration, recollection and recreation following a security breach or data leak.
CyberEdge is designed to respond to a variety of cyber risk exposures not covered under conventional casualty insurances.
Today almost every business is depending on their critical data. CyberEdge is suitable for consideration by most organisations,
locally and globally.
Covers the financial consequences of losing or mis-appropriating customer or employee data
Provides access to a cyber-incident response team from industry specialists and covers the PR costs of reducing the damage it could cause to your reputation. Includes forensic services following a data breach; assistance to repair company and individual reputations; breach coaching and associated notification costs
Covers the potentially significant costs and expenses of a data protection regulator’s investigation and fines following data security breaches
Covering the costs of restoring, recollecting or recreating data after a leak or breach
AIG developed the CyberEdge Mobile App in response to the clear demand for information about cyber risk and how to help mitigate and respond to it. With many features globalized, our app puts the cyber information users want at their fingertips.