{"id":51313,"date":"2023-04-04T00:00:00","date_gmt":"2023-04-04T00:00:00","guid":{"rendered":"urn:uuid:3c0bddd6-bdbb-dea6-1feb-5830682502d7"},"modified":"2023-04-04T00:00:00","modified_gmt":"2023-04-04T00:00:00","slug":"cyber-insurance-coverage-faq-with-datastream-ceo","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/","title":{"rendered":"Cyber Insurance Coverage FAQ with DataStream CEO"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-insurance-coverage:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/ciso\/thumbnails\/23\/cyber-insurance-coverage.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Common perception now points to the COVID-19 epidemic as the demarcation point for our <a href=\"https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html\" target=\"_blank\" rel=\"noopener\">new era for cybersecurity<\/a>. This expansion of remote work and cloud services has widened the attack surface significantly and placed security leaders in a position to approach cybersecurity and cyber risk more proactively.<\/p>\n<p>However, the \u201cnew normal\u201d hasn\u2019t just affected the how IT security teams operate, as we\u2019re seeing a hardening of the <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/22\/h\/cyber-insurance-market-2022.html\">cyber insurance market<\/a>. This is due to an influx of email-borne cyberattacks. According to a Forbes study, the percentage of organizations hit with ransomware attacks <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/08\/22\/ransomware-attacks-hit-two-out-of-three-organizations-in-2021-heres-what-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">jumped to 66%<\/a> in 2021, representing a 29% year-over-year increase.<\/p>\n<p>In a recent #TrendTalks session, Vince Kearns helps security leaders make sense of the current state of the market with cyber insurance expert Andy Anderson.<\/p>\n<p><b>Q: When looking at traditional insurance services, like auto and home, much of that is based on historical performance or location. How is the average cyber insurance plan determined?<\/b><\/p>\n<p>According to Anderson, \u201cwe take a data first approach. We use a lot of fancy computers and data science. Particularly, machine learning and artificial intelligence to understand what are the things that that may influence the likelihood of an organization having a cyber incident.\u201d<\/p>\n<p><b>Q: Much like any insurance service, there are several tiers from which an organization can choose. How do security leaders measure coverage requirements?<\/b><\/p>\n<p>\u201cSo typically, we sell most often a million dollars\u2019 worth of coverage,\u201d explains Anderson. \u201cBut then there is the overall limit of the policy. But then there are sub-limits on specific types of events. So, a cyber policy is sort of multiple insurance policies in one. and it covers the different types of events.\u201d<\/p>\n<p><b>Q: We\u2019re seeing these tiered services falling into two categories, those with comprehensive policies but with more requirements and those with less requirements but higher premiums and deductibles. What makes for a good cyber insurance plan?<\/b><\/p>\n<p>Anderson discusses what security leaders should look for in an insurance provider. \u201cYou really want to be understanding kind of what&#8217;s the cost per that much coverage, what&#8217;s known as the rate and particularly looking at the sub limits here, like ransomware, email compromise or what&#8217;s known as cybercrime, the actual theft of money.\u201d<\/p>\n<p>\u201cThe second would be the deductible. In commercial insurance policies, it&#8217;s known as retention,\u201d says Anderson. \u201cSo, you want to think about, what&#8217;s my limit? What&#8217;s the cost of that? What am I actually going to be on the hook to pay? Maybe you have a full million dollars of cyber coverage for a ransomware event, but there&#8217;s 20 or even 50% co-insurance. So essentially then you&#8217;re on the hook for your half of that.\u201d<\/p>\n<p>Anderson explains there are \u201ctwo flavors of how these carriers will pay.\u201d One is a reimbursement policy where it is assumed the organization is responsible for paying unless it is specified to be pay-on-behalf. In this regard, the carrier will cover the cost on behalf of the organization. Pay-on-behalf is the preferred policy for businesses because it takes the pressure off having to come up with hundreds of thousands of dollars in Bitcoins to pay a ransom.<\/p>\n<p><b>Q: With Forrester predicting that cloud-native adoption would rise to <a href=\"https:\/\/www.forrester.com\/report\/predictions-2022-cloud-computing\/RES176454\" target=\"_blank\" rel=\"noopener\">half of all enterprise organizations<\/a>, it\u2019s important to know what exactly you\u2019re receiving when partnering with a cyber insurance company. What does a typical plan cover?<\/b><\/p>\n<p>When describing areas in which organizations suffer from cyber incidents, Anderson urges security leaders to examine each of the following when choosing an insurance partner.<\/p>\n<p>&#8220;The one that people historically have thought about are these data breaches. And that means really just the loss often of confidential or sensitive data. They can be expensive, particularly when it&#8217;s a lot of records.\u201d With IBM Security reporting that <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">83% of organizations<\/a> studied have had more than one data breach, Anderson gives caution, \u201ca lot of the focus in the last couple of years and what have been driving lost trends are really business interruption, cyber extortion, and then cybercrime.\u201d<\/p>\n<p>According to a recent <a href=\"https:\/\/netdiligence.com\/wp-content\/uploads\/2022\/10\/NetD_2022_Claims_Study_1.0_PUBLIC.pdf\" target=\"_blank\" rel=\"noopener\">NetDiligence Cyber Claims Study<\/a>, the average cost of a ransomware attack was USD 4.54 million, while business email compromise (BEC) attacks cost an average of USD 4.89 million.<\/p>\n<p>This leads Anderson to stress the need for organizations to possess a good security posture. \u201cParticularly XDR and MDR can really do that. You might have something happen on a single device, but it&#8217;s not going across the entire network. It&#8217;s not leading to one of these catastrophic type of outcomes.\u201d<\/p>\n<p><span class=\"body-subhead-title\">Next steps<\/span><\/p>\n<p>For more information about reducing cyber risk, check out the following resources:<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/ciso\/23\/d\/cyber-insurance-coverage.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To help organizations simplify the cyber insurance process and understand the must-have security controls involved, Trend Micro Cyber Risk Specialist, Vince Kearns, and Data Stream CEO and Co-Founder, Andy Anderson, examine cyber insurance coverage along with approaches to strengthening cybersecurity strategies. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":51314,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9528,9549,10337,9550,9548,9527,10405,9529],"class_list":["post-51313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-ciso-article","tag-trend-micro-ciso-cloud","tag-trend-micro-ciso-cyber-insurance","tag-trend-micro-ciso-detection-and-response","tag-trend-micro-ciso-digital-transformation","tag-trend-micro-ciso-expert-perspective","tag-trend-micro-ciso-ransomware","tag-trend-micro-ciso-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Insurance Coverage FAQ with DataStream CEO 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Insurance Coverage FAQ with DataStream CEO 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-04T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-insurance-coverage:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Insurance Coverage FAQ with DataStream CEO\",\"datePublished\":\"2023-04-04T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg\",\"keywords\":[\"Trend Micro CISO : Article\",\"Trend Micro CISO : Cloud\",\"Trend Micro CISO : Cyber Insurance\",\"Trend Micro CISO : Detection and Response\",\"Trend Micro CISO : Digital Transformation\",\"Trend Micro CISO : Expert Perspective\",\"Trend Micro CISO : Ransomware\",\"Trend Micro CISO : Risk Management\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/\",\"name\":\"Cyber Insurance Coverage FAQ with DataStream CEO 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg\",\"datePublished\":\"2023-04-04T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-insurance-coverage-faq-with-datastream-ceo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro CISO : Article\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-ciso-article\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Insurance Coverage FAQ with DataStream CEO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Insurance Coverage FAQ with DataStream CEO 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Insurance Coverage FAQ with DataStream CEO 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-04-04T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/cyber-insurance-coverage:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Insurance Coverage FAQ with DataStream CEO","datePublished":"2023-04-04T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/"},"wordCount":777,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg","keywords":["Trend Micro CISO : Article","Trend Micro CISO : Cloud","Trend Micro CISO : Cyber Insurance","Trend Micro CISO : Detection and Response","Trend Micro CISO : Digital Transformation","Trend Micro CISO : Expert Perspective","Trend Micro CISO : Ransomware","Trend Micro CISO : Risk Management"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/","name":"Cyber Insurance Coverage FAQ with DataStream CEO 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg","datePublished":"2023-04-04T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/04\/cyber-insurance-coverage-faq-with-datastream-ceo-scaled.jpg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-insurance-coverage-faq-with-datastream-ceo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro CISO : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-ciso-article\/"},{"@type":"ListItem","position":3,"name":"Cyber Insurance Coverage FAQ with DataStream CEO"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51313"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51313\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/51314"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}