Rewriting the Rules of Risk

Through our tailored security tools, modular insurance policies, and actionable cyber hygiene plan, these organizations became more than cyber-covered or secured; they became cyber resilient.

All Resources
Case Study: Automotive

Improving your security should improve your coverage. 

Context:  This company in the automotive industry came to Resilience looking for an adequate cyber insurance policy. Initially, they did not plan to implement a new set of security tools, employed a small IT staff who only dedicated around 20% of their time to security, and did not budget for a larger investment in their […]

Read the Case Study
Case Study: Local Gov’t

Focused and targeted incident response and management reduces the impact of an attack 

Context:  This client with the local government came to Resilience looking for strong insurance coverage to supplement their investment in cyber security. Through our proactive onboarding process, we identified their need for an incident response plan and provided them with our template. Our team tailored recommendations for best practice incident management. We introduced the client […]

Read the Case Study
Case Study: Distribution

Cyber insurance should tell you how much to invest in cybersecurity

Introduction:  Our client in the distribution industry was relatively small but had a complex business model with a number of critical SaaS providers that they depended on for their day-to-day operations. The company had trouble determining how much insurance coverage they should purchase as peer benchmarks didn’t account for the complex nature of their risk, […]

Read the Case Study
Case Study: Education

A thorough Incident Response Plan allows you to take a hit without impacting your material ability to deliver value. 

Context This client in the education industry experienced two incidents in the recent past, making it a challenge for them to qualify for insurance in the open market. Resilience’s security team recognized the likely cause of these successful attacks was their poor security posture. Our security team knew there was significant work to be done […]

Read the Case Study
1 2 3 4

Cyber Resilience starts here.

Request Demo