Skip To Main Content

AIG Cyber Resiliency Program

Empowering Cyber insureds through expertise, insights, and targeted loss prevention services

Empowering Cyber Resiliency

AIG empowers our cyber insureds to elevate their cyber resiliency from day one of their policy. We combine our technical expertise and decades of claims insights with targeted cybersecurity services from industry-leading cybersecurity firms to help clients act before threats become realities.

From notifying clients of unpatched vulnerabilities to employee cybersecurity training services, our comprehensive, data-backed Cyber Resiliency Program approach helps clients proactively mitigate a cyber incident and its far-reaching effects

Cyber Resiliency Program at a Glance

End-to-End Data-Backed Approach

The services described below are third-party services:

Employee Cybersecurity eLearning and Phishing Simulations

  • Timely and measurable managed training and compliance service for up to 10,000 employees, available in more than 30+ languages and tailored to employee roles to reinforce clients’ cybersecurity best practices. Learn more and get started.

Blacklist IP Blocking and Domain Protection

  • Enables clients to control their organisation’s exposure to criminal activity by leveraging vast threat intelligence repositories, precision geo-blocking, and blacklist automation to reduce risk. Learn more and get started.

Infrastructure Vulnerability Scan

  • Up to 250 of a client’s selected IP addresses examined by experts to identify vulnerabilities that are open to potential exploits by cyber criminals, with a follow up scan 90 days later. Learn more and get started.

Security Ratings

  • Clients can see how their internet security posture and network score from an “outside looking in” perspective, with easy-to-understand scoring systems. Learn more and get started.

Darknet Credential Exposure

  • Identifies domain-level cyber risks from enterprise data that is exposed on the darknet, with reports customised to the client’s specific domain. Learn more and get started.

Ransomware Risk Assessment

  • A tailored ransomware risk assessment based on the latest threat intelligence categorises and scores key controls the client has in place that may help prevent a ransomware event. Learn more and get started.

Identity Risk Assessment

  • An identity risk assessment of the client’s active directory infrastructure to help identify risks and exposures, with consultation by a technician to help interpret the findings and answer questions. Learn more and get started.

Tailored Incident Response Plan

  • A business incident response plan template tailored for large organisations to help ensure clients can respond appropriately, quickly, and efficiently to a cyber incident. Learn more and get started.

Cybersecurity Information Portal

  • 24/7 online access to current cybersecurity information, including best practices checklists, claims data, and a breach calculator. Learn more and get started.

AIG Claims Process Orientation

  • A one-on-one review of critical response and reporting steps a client should take in the event of a cyber incident. Learn more and get started.

AIG Cyber Loss Control Onboarding

  • A 30 minute one-on-one call with an AIG Cyber Risk Mentor to learn more about the complimentary Cyber Resiliency Program services available.

AIG Cyber Risk Dialog

  • One-on-one session with an AIG Cyber Risk Mentor to address clients’ questions, such as their risk posture, cyber maturity report findings, or the preventative services included with their CyberEdge® policy. Learn more

Cygnvs

Additional Tools and Services

In addition the Cyber clients have access to the following services at a preferred rate, some of which are available for a free demo. These services have been specifically selected based on our decades of experience and how well they can help strengthen the cybersecurity maturity of an organisation.

  • BitSight Security Ratings, powered by BitSight Technologies, lets clients measure and monitor their own network and those of their third-party vendors. Learn more

  • Endpoint Detection and Response (EDR), powered by CrowdStrike’s Falcon Insight, delivers continuous, comprehensive endpoint visibility and automatically detects and intelligently prioritizes malicious activity to ensure nothing is missed and potential breaches are stopped. Learn more

  • CyberArk DNA, powered by CyberArk, uncovers privileged accounts, credentials, and secrets on-premises and in the cloud. CyberArk DNA can help clients prioritize the highest risk accounts that require attention first. Learn more

  • Enterprise Protection, powered by SpyCloud, enables businesses to act on exposed workforce authentication data before criminals can use it to perpetrate cyberattacks. Learn more

  • Breach & Attack Simulation, powered by SafeBreach, enables clients to assess the efficacy of their security ecosystem by safely executing breach scenarios to determine where security is working as expected and where attacks can break through. Learn more

  • Unified Identity Protection Platform, powered by Silverfort, enforces adaptive MFA protection on users’ access to any on-prem and cloud resource and automated monitoring of service accounts. Learn more

The services described below are third-party services:

Employee Cybersecurity eLearning and Phishing Simulations

  • Timely and measurable managed employee training and compliance courses available in 30+ languages for up to 50 employees, tailored to employee roles to reinforce clients’ security policies Learn more and get started.

Security Ratings

  • Clients can see how their internet security posture and network score from an “outside looking in” perspective, with easy-to-understand scoring systems. Learn more and get started.

Darknet Credential Exposure

  • Identifies domain-level cyber risks from enterprise data that is exposed on the darknet, with reports customised to the client’s specific domain. Learn more and get started.

Ransomware Risk Assessment

  • A tailored ransomware risk assessment based on the latest threat intelligence categorises and scores key controls the client has in place that may help prevent a ransomware event. Learn more and get started.

Identity Risk Assessment

  • An identity risk assessment of the client’s active directory infrastructure to help identify risks and exposures, with consultation by a technician to help interpret the findings and answer questions. Learn more and get started.

Tailored Incident Response Plan

  • A business incident response plan template tailored to a company’s size to help ensure the client can respond appropriately, quickly, and efficiently to a cyber incident. Learn more and get started.

Cybersecurity Information Portal

  • 24/7 online access to current cybersecurity information, including best practices checklists, claims data, and a breach calculator. Learn more and get started.

AIG Claims Process Orientation

  • A one-on-one review of critical response and reporting steps a client should take in the event of a cyber incident. Learn more and get started.

AIG Cyber Loss Control Onboarding

  • A 30 minute one-on-one call with an AIG Cyber Risk Mentor to learn more about the complimentary Cyber Resiliency Program services available.

AIG Cyber Risk Dialog

  • One-on-one session with an AIG Cyber Risk Mentor to address clients’ questions, such as their risk posture, cyber maturity report findings, or the preventative services included with their CyberEdge® policy. Learn more

Cygnvs

Additional Tools and Services

In addition the Cyber clients have access to the following services at a preferred rate, some of which are available for a free demo. These services have been specifically selected based on our decades of experience and how well they can help strengthen the cybersecurity maturity of an organisation.

  • BitSight Security Ratings, powered by BitSight Technologies, lets clients measure and monitor their own network and those of their third-party vendors. Learn more

  • Endpoint Detection and Response (EDR), powered by CrowdStrike’s Falcon Insight, delivers continuous, comprehensive endpoint visibility and automatically detects and intelligently prioritizes malicious activity to ensure nothing is missed and potential breaches are stopped. Learn more

  • CyberArk DNA, powered by CyberArk, uncovers privileged accounts, credentials, and secrets on-premises and in the cloud. CyberArk DNA can help clients prioritize the highest risk accounts that require attention first. Learn more

  • Enterprise Protection, powered by SpyCloud, enables businesses to act on exposed workforce authentication data before criminals can use it to perpetrate cyberattacks. Learn more

  • Breach & Attack Simulation, powered by SafeBreach, enables clients to assess the efficacy of their security ecosystem by safely executing breach scenarios to determine where security is working as expected and where attacks can break through. Learn more

  • Unified Identity Protection Platform, powered by Silverfort, enforces adaptive MFA protection on users’ access to any on-prem and cloud resource and automated monitoring of service accounts. Learn more

The services described below are third-party services:

Cybersecurity Information Portal

  • 24/7 online access to current cybersecurity information, including best practices checklists, claims data, and a breach calculator. Learn more and get started.

Darknet Credential Exposure

  • Identifies domain-level cyber risks from enterprise data that is exposed on the darknet, with reports customised to the client’s specific domain. Learn more and get started.

Tailored Incident Response Plan

  • A business incident response plan template tailored for small- to mid-sized businesses to help ensure clients can respond appropriately, quickly, and efficiently to a cyber incident. Learn more and get started.

Security Ratings

  • Clients can see how their internet security posture and network score from an “outside looking in” perspective, with easy-to-understand scoring systems. Learn more and get started.

AIG Cyber Loss Control Onboarding

  • A 30 minute one-on-one call with an AIG Cyber Risk Advisor to learn more about the complimentary Cyber Resiliency Program services available.

Cygnvs

Additional Tools and Services

In addition the Cyber clients have access to the following services at a preferred rate, some of which are available for a free demo. These services have been specifically selected based on our decades of experience and how well they can help strengthen the cybersecurity maturity of an organisation.

  • BitSight Security Ratings, powered by BitSight Technologies, lets clients measure and monitor their own network and those of their third-party vendors. Learn more

  • Endpoint Detection and Response (EDR), powered by CrowdStrike’s Falcon Insight, delivers continuous, comprehensive endpoint visibility and automatically detects and intelligently prioritizes malicious activity to ensure nothing is missed and potential breaches are stopped. Learn more

  • CyberArk DNA, powered by CyberArk, uncovers privileged accounts, credentials, and secrets on-premises and in the cloud. CyberArk DNA can help clients prioritize the highest risk accounts that require attention first. Learn more

  • Enterprise Protection, powered by SpyCloud, enables businesses to act on exposed workforce authentication data before criminals can use it to perpetrate cyberattacks. Learn more

  • Breach & Attack Simulation, powered by SafeBreach, enables clients to assess the efficacy of their security ecosystem by safely executing breach scenarios to determine where security is working as expected and where attacks can break through. Learn more

  • Unified Identity Protection Platform, powered by Silverfort, enforces adaptive MFA protection on users’ access to any on-prem and cloud resource and automated monitoring of service accounts. Learn more

Client Testimonials

“AIG provided us with our first notification about a cyber vulnerability. The actionable information is a feather in AIG’s cap. This is a valuable part of what cyber insurance is going forward."

– CISO of a medium-sized manufacturing company

Products or services may not be available in all countries and jurisdictions, and coverage is subject to underwriting requirements and actual policy language. The scenarios described herein are offered only as examples. Coverage depends on the actual facts of each case and the terms, conditions and exclusions of each individual policy. Anyone interested in the above product(s) should request a copy of the standard form of policy for a description of the scope and limitations of coverage. The Insurer may at any time add or replace an aid or service to this offer as part of the offer of the aforementioned loss prevention services.