Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Cyber Insurance Challenges for OT & CPS Environments

Claroty
04/02/2026
14
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cyber insurance for OT environments faces a critical data gap — underwriters lack the historical actuarial data they rely on for IT, home, or auto insurance, making risk assessment challenging in fragmented OT ecosystems.
  • OT systems present higher-stakes risks than IT because they're directly connected to physical safety and can cause bodily injury, system failures, and business interruption with impacts beyond financial loss.
  • Safe Security partners with Claroty to provide real-time telemetry from OT environments, enabling inside-out underwriting that reveals actual security controls rather than relying on insufficient outside-in scans.
  • The traditional insurance questionnaire model (250+ questions, point-in-time assessment) is becoming outdated — the future requires AI-driven automation and continuous risk monitoring to match the pace of evolving threats.
  • Insurance should be treated as a financial resilience control for residual risk transfer after mitigation investments, not as an operational control or excuse to avoid security improvements.

The Data Gap in OT Cyber Insurance

Pankaj Goyal, COO of Safe Security, explains how cyber insurance for operational technology environments faces fundamental challenges that don't exist in traditional IT insurance. Unlike home or auto insurance where underwriters have decades of actuarial data, OT cyber insurance lacks historical precedent and predictive models. The fragmented nature of OT ecosystems — with proprietary technologies from vendors like Siemens and Rockwell — creates visibility gaps that traditional outside-in security assessments cannot address. Safe Security's platform integrates with Claroty to provide real-time telemetry from OT environments, enabling underwriters to move from point-in-time questionnaires to continuous risk assessment. This inside-out approach allows brokers like Marsh to help customers improve their insurability before coverage discussions begin, while carriers like Chubb and Mosaic Insurance can differentiate good risks from bad risks based on actual control implementations rather than external scans.

Physical Impact and Expanding Attack Surface

The conversation highlights a critical distinction between IT and OT security: OT systems are directly connected to physical safety and can cause bodily injury or system failures that impact human life. Goyal notes that the OT attack surface is expanding not just through owned assets but through third-party suppliers and medical device vendors in healthcare environments. The proximity of OT to physical operations makes these systems attractive targets for attackers with motivations beyond financial gain. Insurance companies are developing OT supplemental questionnaires to understand these risks, but Goyal argues that manual, point-in-time assessments are insufficient when attackers operate continuously. The partnership between Safe Security and Claroty aims to provide the real-time visibility that both security teams and insurance underwriters need to understand vulnerabilities, misconfigurations, and the potential for lateral movement between IT and OT environments.

Automation and the Future of Risk Assessment

Looking forward, Goyal envisions a fundamental shift in how organizations approach OT security and insurance. He advocates for AI-driven automation of insurance questionnaires to free security teams from manual labor and redirect effort toward real-time gap remediation. The goal is to eliminate the artificial boundary between IT and OT, treating technology as a continuous spectrum rather than separate domains. Safe Security is developing agentic AI capabilities for autonomous third-party risk management, similar to how self-driving cars operate. Goyal expects that within two years, there will be significantly more transparency around OT risk, more proactive remediation by CIO and CISO teams, and insurance companies will have evolved from basic supplemental questionnaires to sophisticated real-time risk assessment models. The key message: insurance should be viewed as a financial resilience control for residual risk transfer, not as a substitute for operational security investments.

Chapters

0:00 - Introduction and Safe Security Overview
3:22 - Insurance Data Problem and Ecosystem
6:36 - Inside-Out vs Outside-In Underwriting
8:12 - OT Environment Challenges
12:05 - OT Fragmentation and Clarity Integration
14:30 - Third-Party Risk and Supply Chain
17:47 - OT Supplemental Questionnaires
21:38 - OT Resilience and Business Continuity
24:51 - CISO Advice on Insurance Strategy
27:05 - Future of OT Cyber Insurance

Key Quotes

4:05 "Cyber insurance compared to other principles or lines of insurance is relatively new. So the data is limited and it is frustrating. It has been frustrating over the last four to five years where the insurance industry has basically, in many ways, it is driving blind, like they want more data."
9:21 "OT is much closer to the human life compared to IT. IT is closer to the digital life, the data, but OT can cause, and we have unfortunately seen many examples where OT can cause bodily injuries in a couple of cases, even human deaths, system failure, and so on."
16:24 "The AI has to be in the lead, and the human has to be in the loop, versus the actual actioning based on real-time validation, real-time telemetry from the environment, that's where we should focus 90% of our efforts on."
24:08 "The damages on the reputation side, the non-quantitative damages can be more impactful than the financial damages, which can be potentially covered by insurance. So insurance companies are never going to cover your reputational damage."
27:20 "In cyber, almost none of this is true. So there's not a lot of history, there's not a lot of common data, and the history of the past may not be a good indicator of the future."
Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • OT
  • IoT Security
  • Compliance & Governance
  • Third-Party Risk
  • Technical Deep Dive
  • Interview
  • Cyber Insurance for OT
  • Operational Technology Security
  • Risk Quantification
  • Third-Party Risk Management
  • Insurance Underwriting
  • Real-Time Telemetry
  • IT-OT Convergence
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cyber Insurance Challenges for OT & CPS Environments

              Upcoming Webinar Calendar

              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026
                https://www.truthinit.com/index.php/channel/1868/insights-into-saas-data-protection-from-the-keepit-annual-data-report-2026/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights
                https://www.truthinit.com/index.php/channel/1886/detecting-cyber-attacks-before-they-evolve-into-breaches-with-ai-insights/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively.
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implement Effective Strategies for Securing Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/implement-effective-strategies-for-securing-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Findings
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-findings/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Transforming AI from fantasy to purposeful management
                https://www.truthinit.com/index.php/channel/1924/transforming-ai-from-fantasy-to-purposeful-management/

              Upcoming Events

              • Apr
                30

                Insights into SaaS Data Protection from the Keepit Annual Data Report 2026

                04/30/202610:00 AM ET
                • Apr
                  30

                  The New Economics of a VMware Exit

                  04/30/202601:00 PM ET
                  • May
                    06

                    Detecting Cyber Attacks Before They Evolve Into Breaches with AI Insights

                    05/06/202602:00 AM ET
                    • May
                      06

                      World Password Day: Strategies for Managing Your Passwords Effectively.

                      05/06/202610:00 PM ET
                      • May
                        07

                        World Password Day: Strategies for Managing Your Passwords Effectively.

                        05/07/202605:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version