Click here for the Friday Reading Search, a searchable archive of reading and knowledge resources

Since March 2020, Airmic has been issuing Friday Reading, a curated series of readings and knowledge resources sent by email to Airmic members. The objective of Airmic Friday Reading was initially to keep members informed during the Covid-19 pandemic. Today, Airmic Friday Reading has evolved in scope to include content on a wide range of subjects with each email edition following a theme. This page is a searchable archive of all the readings and knowledge resources that have been shared.

To select multiple categories and/or keywords, use Ctrl+Click (or +Click on a Mac).
Lockton, 28th March 2022
Given the potential for increased cybercrime, it is important to ensure that organizations evaluate their crime policy or policies if they sustain any type of monetary loss from a cyber event. The electronic loss of funds can potentially implicate both cyber and crime policies.
Oliver Wyman, 15th March 2022
Russian state-sponsored actors have demonstrated the capability and willingness to target public and private infrastructure in neighbouring states and beyond. And countless cyber criminals and other opportunists will seek to exploit the fog of war to launch malicious attacks for their own monetary gain. Governments and companies need to be vigilant in tightening their cybersecurity protocols and heightening defences to counter these threats.
Categories:
KPMG, 1st March 2022
After months and weeks of tension, the Russian government’s invasion of Ukraine has elevated concerns for cyber security incidents and the resilience of critical business functions. While there remains a significant amount of uncertainty around the conflict, including the duration, scale and reach, there are some key considerations that can help to evaluate cyber security preparedness levels.
Categories:
Control Risks, 3rd January 2022
Friday Reading Edition 102 (14th April 2022)
[Free to read upon sharing contact details] As the build-up and response to Russia’s invasion of Ukraine has clearly demonstrated, the US, EU, UK, and many other countries use sanctions as both a reactive and proactive tool in foreign policy. Whether used as deterrent to specific actions or in response to major geopolitical actions, the sanctions themselves have significant and widespread implications for business that increase legal, operational and reputational risks to business across the globe.
Categories:
Airmic,BLM, 8th April 2022
Updated version released April 2022 , covering the latest developments in UK GDPR, including the International data transfer agreement (IDTA) which came into force last month – There are also some very significant GDPR ramifications to this post-Covid new normal. WFH, even if only a part of the post-Covid normal, has rendered many existing security regimes, designed for a pre-pandemic world, redundant.
Categories:
Pool Re, 24th March 2022
[Free to access upon setting up an account] The risk of Russian cyber retaliation in response to Western sanctions over Ukraine is just one pressing reason why the UK’s new national cyber strategy is so important.
Categories:
Keywords:
Control Risks, 22nd October 2020
Outlines some of the key strategies that businesses can use to stay one step ahead of ransomware extortionists in light of their evolving approaches to targeting and extorting victims.
Categories:
Howden
Ransomware and warning shots about risk aggregation have added a big dose of complexity into an already complicated cyber risk landscape. Insurers are weighing the delicate balance of growth vs discipline in the face of surging claims and deteriorating profitability.
Lockton, 3rd March 2022
Knowledge of how war exclusions have been interpreted in the past can be useful in evaluating the applicability of the exclusion under the current circumstances around the Ukraine crisis.
WTW, 24th February 2022
Friday Reading Edition 98 (18th March 2022)
Most, if not all, cyber insurance policies contain a war exclusion of some description. Given the current situation, it is natural that organizations will want to understand how their cyber policy will likely respond in the event of a loss caused by a cyberattack alleged to have been deployed by or on behalf of the Russian state.