The services described below are third-party services:
Employee Cybersecurity eLearning and Phishing Simulations
- Timely and measurable managed training and compliance service for up to 10,000 employees, available in more than 30+ languages and tailored to employee roles to reinforce clients’ cybersecurity best practices. Learn more and get started.
Blacklist IP Blocking and Domain Protection
- Enables clients to control their organisation’s exposure to criminal activity by leveraging vast threat intelligence repositories, precision geo-blocking, and blacklist automation to reduce risk. Learn more and get started.
Infrastructure Vulnerability Scan
- Up to 250 of a client’s selected IP addresses examined by experts to identify vulnerabilities that are open to potential exploits by cyber criminals, with a follow up scan 90 days later. Learn more and get started.
Security Ratings
- Clients can see how their internet security posture and network score from an “outside looking in” perspective, with easy-to-understand scoring systems. Learn more and get started.
Darknet Credential Exposure
- Identifies domain-level cyber risks from enterprise data that is exposed on the darknet, with reports customised to the client’s specific domain. Learn more and get started.
Ransomware Risk Assessment
- A tailored ransomware risk assessment based on the latest threat intelligence categorises and scores key controls the client has in place that may help prevent a ransomware event. Learn more and get started.
Identity Risk Assessment
- An identity risk assessment of the client’s active directory infrastructure to help identify risks and exposures, with consultation by a technician to help interpret the findings and answer questions. Learn more and get started.
Tailored Incident Response Plan
- A business incident response plan template tailored for large organisations to help ensure clients can respond appropriately, quickly, and efficiently to a cyber incident. Learn more and get started.
Cybersecurity Information Portal
- 24/7 online access to current cybersecurity information, including best practices checklists, claims data, and a breach calculator. Learn more and get started.
AIG Claims Process Orientation
- A one-on-one review of critical response and reporting steps a client should take in the event of a cyber incident. Learn more and get started.
AIG Cyber Loss Control Onboarding
- A 30 minute one-on-one call with an AIG Cyber Risk Mentor to learn more about the complimentary Cyber Resiliency Program services available.
AIG Cyber Risk Dialog
- One-on-one session with an AIG Cyber Risk Mentor to address clients’ questions, such as their risk posture, cyber maturity report findings, or the preventative services included with their CyberEdge® policy. Learn more
Cygnvs