InsureThink

How cyber insurance claim disputes are changing

Marriott building
Al Drago/Bloomberg

In cyber insurance, most conversations still center on underwriting. Controls, questionnaires, and security posture dominate the evaluation of risk before a policy is even written. But increasingly, the real test is not happening before the breach. It is happening after.

Processing Content

Consider the Marriott breach, where attackers gained access to Starwood's systems in 2014 and remained undetected until 2018, including after the Marriott acquisition two years prior. By the time the breach was discovered, attackers had accessed data tied to hundreds of millions of guest records, making it one of the longest-running undetected breaches on record. The aftermath was not just a security failure but a reconstruction problem. 

Beyond regulatory penalties, incidents like Marriott's expose a deeper issue. When organizations cannot clearly reconstruct what happened, they struggle to defend their decisions, their disclosures, and increasingly, their insurance claims.

The shift: Claims disputes are happening during the breach

Cyber insurance disputes used to center on underwriting accuracy, but now they increasingly emerge during claims. Insurers can no longer rely on what organizations reported about their controls. They must validate whether those controls were implemented and followed at the time of the breach. 

Post-incident investigations now focus on questions like: 

  • Were required controls, such as multi-factor authentication, fully deployed? 
  • Did the organization follow incident response and policy requirements? 
  • Were decisions, such as ransom payments, made within policy terms?

Real-world cases show how costly gaps can be. After a ransomware attack on the city of Hamilton, Ontario, the insurer denied coverage, citing incomplete MFA implementation.  
The rise of forensic defensibility
This shift is driving a new requirement in cyber claims: forensic defensibility. In practical terms, this means an organization can: 

1) Preserve evidence in a legally admissible format. 
2) Reconstruct a detailed timeline of the incident. 
3) Demonstrate root cause and scope with confidence.

The difference between being prepared and unprepared often comes down to timing. Prepared organizations collect and preserve data before remediation begins, whereas unprepared organizations attempt to reconstruct events after systems have been wiped, patched, or rebuilt, often destroying critical evidence in the process. The result is like investigating a fire without knowing what was in the room before it burned.  

Evidence sprawl: Why reconstruction is so difficult

Even when organizations try to investigate thoroughly, they face another challenge: evidence sprawl. Today's environments distribute data across SaaS platforms such as Microsoft 365 and Google Workspace, endpoints and security tools, collaboration platforms such as Slack and Teams, and legacy systems and acquired infrastructure. Over time, this creates fragmentation. Mergers, tool sprawl, and unused yet retained systems create blind spots. 

There is a moment in many breach investigations when the issue becomes unavoidable, typically occurring when regulators require disclosure within strict timelines, legal teams prepare public statements, and insurers request detailed incident documentation. At that point, organizations may realize they cannot answer basic questions with certainty. They do not know exactly what data was accessed, where it was stored, or who was impacted. That uncertainty becomes the turning point.

Why reconstruction determines payouts

In cyber claims, if an organization can prove that a limited number of records were exposed, response efforts remain targeted. If it cannot prove scope, it must assume a worst-case scenario. That leads to over-notification of customers, expanded remediation and monitoring costs, and increased legal and regulatory exposure.

These inflated costs often create friction with insurers, particularly when the organization cannot substantiate its claims. If an organization cannot prove what happened, then it must pay for what might have happened.

As claims become more complex, breach response is no longer just a technical exercise. It is a legal one. Three functions must now work in parallel: 

1) Incident response, which focuses on containment and recovery. 
2) Forensics, which focuses on root cause analysis. 
3) Legal and eDiscovery, which focus on liability and litigation.

These priorities can conflict. Rapid remediation can overwrite evidence. Forensic preservation can delay recovery. Legal requirements can expand the scope of data collection. Without coordination, critical evidence may be lost or rendered inadmissible. This is why legal hold, defensible collection, and clear documentation are becoming central to cyber claims.

The misconception puts organizations at risk

A common assumption persists: if an organization can respond to a breach, it is covered.

That assumption is incomplete. Response alone does not produce admissible evidence, verifiable timelines, or defensible claims. In some cases, response actions can even destroy the data needed to support coverage. 

What defensibility ready looks like

Organizations that successfully defend claims share several characteristics, including clear, documented incident response policies that are regularly tested, strong coordination between security, legal, and IT teams, and visibility across all data environments, including legacy systems. 

Defensible organizations also have a strong understanding of policy requirements before an incident occurs. Most importantly, they practice. Tabletop exercises routinely uncover unknown systems, communication gaps, and decision-making challenges before a real breach occurs.

The bottom line is that cyber insurance is evolving. It is no longer enough to have the right controls on paper. Organizations must be able to prove what happened, how it happened, and what was impacted. That requires a shift in mindset, from prevention to reconstruction, from response to defensibility, and from security alone to alignment between security, legal, and risk.


For reprint and licensing requests for this article, click here.
Claims Cyber security Insurtech Cyber attacks
MORE FROM DIGITAL INSURANCE
Load More