Your organisation has cyber insurance. You pay substantial premiums. When ransomware hits, you expect the policy to pay out.
But here's what many organisations discover too late: having cyber insurance and successfully claiming on it are two very different things.
The organisations that get their claims paid in full aren't lucky — they're prepared. Specifically, they understand what their insurer needs and they engage digital forensics professionals who know how to document incidents properly.
This guide explains what cyber insurers actually require, why claims get rejected, and how proper DFIR engagement protects your claim from day one.
How Cyber Insurance Has Changed: 2020-2026
If your understanding of cyber insurance is based on policies from a few years ago, you're working with outdated assumptions. The market has transformed dramatically.
What This Means for Your Claim
In the 2020 market, you could file a claim with minimal documentation and expect payment. In 2026, insurers:
- Employ their own forensics experts who will scrutinise your evidence
- Verify your pre-incident security posture against what you declared during underwriting
- Examine timeline evidence to confirm you met notification requirements
- Investigate root cause to determine if exclusions apply
- Assess your response decisions for reasonableness
This isn't adversarial — it's due diligence. But it means you need proper documentation from the start, not reconstructed after the fact.
The 5 Things Your Insurer Needs on Day One
When you notify your cyber insurer of an incident, the clock starts ticking. Here's what they'll need — and what you should be collecting from hour one.
1. Proof of Reasonable Security Controls
Your insurer will want to verify that you had the security controls in place that you declared during underwriting. This includes:
- MFA deployment evidence: Screenshots, configuration exports, or audit logs showing MFA was enabled on remote access, email, and privileged accounts
- EDR/endpoint protection: Deployment reports, coverage percentages, detection logs from before the incident
- Backup verification: Documentation that backups existed, were tested, and were properly segregated
- Patch management records: Evidence of regular patching, especially for critical vulnerabilities
Why this matters: If you declared "MFA on all remote access" but the attacker got in via a VPN without MFA, your claim may be denied for material misrepresentation.
2. A Forensic Timeline Establishing Breach Date and Scope
Insurers need a clear timeline showing:
- Initial compromise date: When did the attacker first gain access?
- Progression of the attack: How did they move through your environment?
- Discovery date: When did you become aware of the breach?
- Scope: Which systems were affected? What data was accessed?
Why this matters: The timeline affects policy coverage (was the breach during your policy period?), regulatory notification requirements (72-hour clock), and potential subrogation against third parties.
3. Evidence of Containment Steps and Their Timestamps
Your insurer needs to see that you took reasonable steps to contain the breach and minimise damage:
- Containment actions: What did you do to stop the attack spreading?
- Timestamps: When were these actions taken?
- Decision rationale: Why did you choose these containment strategies?
- Effectiveness: Did containment work? If not, what additional steps were taken?
Why this matters: If you delayed containment or took actions that worsened the breach, the insurer may argue you failed to mitigate damages — reducing your claim.
4. Data Impact Assessment
For breaches involving personal data, you need clear documentation of:
- What data was accessed or stolen: Specific data types and categories
- How many records: Numbers matter for regulatory notification and potential liability
- Data sensitivity: Financial data, health data, credentials, etc.
- Evidence methodology: How did you determine what was taken?
Why this matters: This determines notification requirements, potential regulatory fines, and third-party liability coverage. Overstating scope costs you in notifications; understating exposes you to regulatory action.
5. Clear Chain of Custody for All Evidence
Every piece of forensic evidence must be properly documented:
- Collection methodology: How was evidence collected? What tools were used?
- Hash verification: Cryptographic hashes proving evidence integrity
- Handling records: Who accessed the evidence and when?
- Storage security: Where is evidence stored and how is it protected?
Why this matters: If your evidence chain is broken, the insurer's forensics team may challenge your findings. In legal proceedings, contaminated evidence is inadmissible.
Why Cyber Insurance Claims Get Rejected
Understanding common rejection reasons helps you avoid them. Here are the issues we see most frequently — and how proper DFIR engagement prevents each.
Rejection Reason 1: "You failed to maintain documented controls"
What happens: During claims investigation, the insurer discovers that security controls declared during underwriting weren't actually in place. MFA wasn't universal. EDR had gaps in deployment. Backups hadn't been tested.
The insurer's position: This constitutes material misrepresentation. You obtained coverage based on a security posture you didn't have. The claim is denied or coverage is voided entirely.
Rejection Reason 2: "You delayed notification beyond policy requirements"
What happens: Most cyber policies require notification within 24-72 hours of discovering a breach. The organisation waited too long, either because they didn't recognise the severity or delayed to "investigate further."
The insurer's position: Late notification is a policy breach. Coverage may be reduced or denied. Even if covered, the insurer argues they couldn't mitigate damages because of the delay.
Rejection Reason 3: "You cannot prove the breach was external"
What happens: Cyber insurance typically covers attacks by external threat actors. Insider threats, employee negligence, or accidental data exposure may be excluded or covered under different terms. Without forensic evidence, the insurer may dispute the attack's nature.
The insurer's position: You've claimed for a ransomware attack, but we can't verify it wasn't an insider who deployed the ransomware or an employee who fell for social engineering due to inadequate training. This falls under a different coverage section or exclusion.
Rejection Reason 4: "Evidence was tainted or chain of custody is broken"
What happens: Well-meaning IT staff try to investigate before calling professionals. They turn systems off (destroying volatile evidence), run antivirus (deleting malware samples), or restore from backup (overwriting evidence). When the forensics team arrives, critical evidence is gone or contaminated.
The insurer's position: We can't validate your claims because evidence wasn't preserved properly. The forensic report is unreliable. We're reducing your claim based on what we can actually verify.
Rejection Reason 5: "You paid a sanctioned entity"
What happens: In the rush to recover, the organisation pays a ransom without proper sanctions screening. It later emerges the ransomware group or the payment recipient was on OFAC, OFSI, or other sanctions lists.
The insurer's position: We cannot reimburse payments that may constitute sanctions violations. Coverage is denied for the ransom payment and potentially for other costs due to policy breach.
The Insurer's Perspective: What They're Really Looking For
Cyber insurers aren't trying to deny legitimate claims. They're protecting themselves against fraud, misrepresentation, and claims that exceed actual damages. Understanding their perspective helps you present your claim effectively.
What Insurers Want to See
| What They're Assessing | What They Need | How to Provide It |
|---|---|---|
| The breach actually happened | Forensic evidence of attacker activity | Memory analysis, log review, malware samples, IOCs |
| The stated scope is accurate | Evidence-based data impact assessment | Access logs, exfiltration analysis, file access records |
| You had declared controls | Pre-incident documentation of security posture | Configuration exports, deployment reports, audit logs |
| You responded reasonably | Timeline of response actions with rationale | Incident logs, decision documentation, containment evidence |
| Claimed costs are legitimate | Invoices, receipts, business impact documentation | DFIR engagement records, restoration costs, lost revenue evidence |
Panel Providers vs. Your Own Choice
Many cyber insurance policies specify "panel" providers — pre-approved IR firms the insurer has vetted. There are trade-offs to understand:
Using panel providers:
- Streamlined claims process (insurer pays provider directly)
- No disputes about provider qualification
- May be required by your policy
Using non-panel providers:
- You choose the expertise you want
- Provider works for you, not the insurer
- May need pre-approval to ensure costs are covered
- You control the relationship and reporting
Coordinating DFIR and Insurance: A Practical Workflow
Here's how incident response, forensics, and insurance coordination should work together:
Hour 0-4: Initial Response
- Activate IR support (retainer or emergency engagement)
- Notify your cyber insurance broker (start the notification clock)
- Establish secure communications (assume normal channels are compromised)
- Begin evidence preservation (memory capture, log collection)
- Initial triage (scope assessment, containment priorities)
Hours 4-24: Coordination
- Insurer assigns claims adjuster (may also deploy their own forensics)
- Establish reporting cadence (daily updates to insurer)
- Document all response decisions (contemporaneous records)
- Engage breach counsel (insurer may provide or approve)
- Continue forensic investigation (timeline, scope, root cause)
Days 2-7: Investigation and Documentation
- Complete forensic analysis (attack timeline, data impact, root cause)
- Prepare preliminary report for insurer and counsel
- Assess notification requirements (ICO 72-hour clock)
- Document business impact (downtime, lost revenue, response costs)
- Coordinate recovery planning with insurer approval where needed
Week 2+: Resolution and Reporting
- Complete final forensic report (comprehensive documentation for claim)
- Submit claim documentation (report, invoices, impact assessment)
- Support regulatory inquiries (ICO or other regulators)
- Post-incident review (lessons learned, security improvements)
- Follow up on claim (respond to insurer queries)
Case Study: Well-Documented Claim Paid in Full
Organisation: UK professional services firm (200 employees)
Incident: Ransomware attack encrypting file servers and exfiltrating client data
Claimed costs: £380,000 (IR services, legal, notification, business interruption, ransom payment)
What we documented:
- Detailed attack timeline from initial access (phishing email) through encryption
- Evidence that MFA was in place but bypassed via session hijacking
- Comprehensive data impact assessment showing exactly which client files were accessed
- Sanctions screening documentation for ransom payment decision
- Containment actions with timestamps demonstrating immediate response
- Business impact calculation supported by financial records
Common Documentation Mistakes That Hurt Claims
Even with professional DFIR support, organisations sometimes make mistakes that complicate claims:
Mistake 1: Incomplete Business Impact Documentation
You can prove the attack happened, but you can't substantiate the claimed losses. Downtime costs are estimated, not calculated. Lost revenue isn't tied to specific evidence.
Solution: Document business impact contemporaneously. Keep records of systems offline, transactions lost, staff unable to work. Have finance prepare detailed calculations with supporting evidence.
Mistake 2: Communication Outside Privilege
Emails and Slack messages containing speculation about the breach, admissions of security failures, or opinions about liability. These can be discoverable in litigation and used against your claim.
Solution: Route sensitive communications through breach counsel. Establish privilege from day one. Use secure, approved channels for incident discussion.
Mistake 3: Delayed or Incomplete Notification
You notified the insurer but didn't provide required information. Or you made decisions (like paying a ransom) without pre-approval as required by your policy.
Solution: Know your policy's notification requirements. Provide all required information in initial notification. Get explicit approval for major decisions where required.
Mistake 4: Conflicting Accounts
Different people tell the insurer different things. The IT director's account doesn't match the CEO's. The forensic report contradicts earlier statements.
Solution: Designate a single spokesperson for insurer communications. Ensure all statements are fact-checked against forensic findings. Wait for evidence before making definitive statements.
Preparing Before an Incident
The best time to prepare for a cyber insurance claim is before you need one:
Review Your Policy
- Notification requirements: What timeframe? What information is required?
- Panel requirements: Must you use panel providers? Can you pre-approve alternatives?
- Approval requirements: What decisions need insurer pre-approval?
- Exclusions: What isn't covered? (War, acts of state, specific attack types)
- Sub-limits: What are the caps on specific coverage areas?
Document Your Security Posture
- Match declarations: Ensure your actual security matches what you declared during underwriting
- Keep records: Configuration exports, deployment reports, training records
- Test regularly: Documented evidence of backup testing, DR exercises
Establish Relationships
- IR retainer: Have professional support ready to engage immediately
- Breach counsel: Know who you'll call for legal support
- Broker relationship: Your broker can facilitate communication with the insurer
Expert Support for Cyber Insurance Claims
Binary Response provides forensic investigation and documentation that satisfies cyber insurer requirements. We work with all major UK cyber insurers and understand exactly what they need to approve your claim.