Hostname: page-component-89b8bd64d-7zcd7 Total loading time: 0 Render date: 2026-05-06T14:56:48.201Z Has data issue: false hasContentIssue false

Cyber insurance-linked securities

Published online by Cambridge University Press:  08 June 2023

Alexander Braun
Affiliation:
Institute of Insurance Economics, University St. Gallen, Girtannerstrasse 6, 9010, St. Gallen, Switzerland
Martin Eling*
Affiliation:
Institute of Insurance Economics, University St. Gallen, Girtannerstrasse 6, 9010, St. Gallen, Switzerland
Christoph Jaenicke
Affiliation:
Institute of Insurance Economics, University St. Gallen, Girtannerstrasse 6, 9010, St. Gallen, Switzerland
*
Corresponding author: Martin Eling; Email: martin.eling@unisg.ch
Rights & Permissions [Opens in a new window]

Abstract

We investigate the feasibility of cyber risk transfer through insurance-linked securities (ILS). On the investor side, we elicit the preferred characteristics of cyber ILS and the corresponding return expectations. We then estimate the cost of equity of insurers and compare it to the Rate on Line expected by investors to match demand and supply in the cyber ILS market. Our results show that cyber ILS will work for both cedents and investors if the cyber risk is sufficiently well understood. Thus, challenges related to cyber risk modeling need to be overcome before a meaningful cyber ILS market may emerge.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2023. Published by Cambridge University Press on behalf of The International Actuarial Association
Figure 0

Table 1. Investors’ decision criteria and ILS attributes.

Figure 1

Figure 1. Investors’ utility profiles for each product attribute. This figure presents the individual-level part-worth utility profiles for ILS investors (dashed black lines) and other ILS experts (dashed gray lines) as well as aggregate-level median utility profiles across ILS investors (solid red lines) for all five product attributes. Due to the small sample size, we refrain from calculating highest density intervals.

Figure 2

Figure 2. Investors’ relative attribute importance. This figure presents individual-level importances across all ILS investors. The numbers denote the first (lower value) and third (upper value) quartile as well as the median. Outliers are omitted.

Figure 3

Figure 3. Investors’ acceptance rate for low and high model risk. This figure presents acceptance rates among ILS investors for different combinations of ILS product attributes. A product is considered feasible if the product utility exceeds the non-participation utility of the investor. All products incorporate a funded instrument. “Ind” denotes an indemnity trigger, “IL” denotes an industry loss trigger, and “Par” denotes a parametric trigger. “1y” denotes a maturity of one year and “3y” denotes a maturity of three years.

Figure 4

Table 2. Properties of different cyber perils.

Figure 5

Table 3. Estimated model parameters of severity distribution $Z$ and goodness-of-fit measures. Goodness-of-fit measures include the negative log-likelihood (-Loglik), the Akaike information criterion (AIC) and the p-value of the Wilcoxon test (Wilcoxon).

Figure 6

Table 4. Observed market data of cat bonds and extracted layers. The data considers cat bonds traded between 1997 and 2017 and is retrieved from Lane Financial LLC. PFL denotes the probability of first loss and POE denotes the probability of exhaustion.

Figure 7

Figure 4. Shift of the ILS tranches. This figure illustrates how PFL and POE change for a shift of the ILS tranches along the exceedance probability curve $1 - F_X$. The distance $\Delta$ between the attachment point A and the exhaustion point E is kept constant.

Figure 8

Table 5. Costs of the risk transfer and comparison to traded cat bonds. All cyber ILS exhibit a low model risk and a funded format. The span of the RoLs is calculated for a multiple of four and six, based on the PRC data. As a robustness test, we also show the EL values based on a discretized log-normal severity and the recursion method (rec) as well as Advisen data with the simulation method (sim). The last column contains average ELs and RoLs of the traded cat bonds that were used to derive our cyber ILS tranches.

Figure 9

Table 6. Premiums written and equity risk premium for insurance companies. Premiums written are shown in USD million. The third column reports the average equity risk premium (ERP) estimated by means of the Fama-French five-factor model. The implied excess cost of equity based on the model of Gode and Mohanram (2003) is shown in the fourth column. The estimation period ranges from 1999 to 2020.

Figure 10

Figure 5. Sensitivity analysis for a shift of the ILS tranches. The attachment and exhaustion point are shifted by the amount shown on the x-axis while the distance $\Delta$ between the points is kept constant. A shift of zero denotes the original ILS tranche derived from traded cat bonds. The lower (upper) black curve denotes the spread calculated with a multiple of four (six). The black line denotes the mean cost of equity across the considered P&C insurance companies. Cost of equity is derived from stock returns by means of the FF5 model.

Figure 11

Table 7. Descriptive statistics for the asset portfolio. The values are estimated based on time series of monthly returns between January 2006 and December 2018. The data has been collected from Bloomberg and Thomson Reuters.

Figure 12

Table 8. Descriptive statistics for the liability portfolio. The values are estimated based on a time series of yearly observations between 2006 and 2018. The estimates for the P&C portfolio are based on losses incurred by the US P&C industry retrieved from the Insurance Information Institute. The estimates for the cyber portfolio are based on mean yearly USD-transformed data breaches published by PRC.

Figure 13

Figure 6. Aggregate loss distribution for the P&C and the cyber risk book. The solid line denotes traditional P&C risks, and the dashed line denotes cyber risks.

Figure 14

Figure 7. Composite portfolio. This figure shows the reference portfolio composed of traditional P&C and cyber risks. The black dot represents the pure P&C portfolio. To the right of this point, the share of cyber risk in the composite portfolio increases. The portfolio costs are shown for different cyber liability correlations $\rho _{a,l}^{c} \in \{0.1, 0.3, 0.5\}$. Increasing $\rho _{a,l}^{c}$ raises the cost of equity. The black triangles mark the CoE-minimizing portfolios. The dashed lines denote the range of spreads demanded by investors for the cyber risk transfer via ILS based on the results in Table 5.

Supplementary material: PDF

Braun et al. supplementary material

Braun et al. supplementary material

Download Braun et al. supplementary material(PDF)
PDF 113.7 KB