Posted on Leave a comment

Cyber insurance won’t save OT, but it can change behaviour

Most discussions about cyber insurance in industrial sectors start from the wrong assumption. They treat insurance as a recovery tool that will somehow make a severe OT incident manageable after the fact. That is too comforting and too shallow. OT environments are not ordinary digital estates. Many security guides stress that these systems carry unique performance, reliability, and safety requirements, and that logic executing in OT has a direct effect on the physical world, including potential harm to people, the environment, equipment, and production.

That is why cyber insurance will not save OT in the way some boards hope it might. Any basic guide to cyber insurance describes cover mainly in terms of losses tied to IT systems and networks, along with incident management support. Put plainly, a policy may help pay for response, legal support, forensics, and parts of business interruption. It does not restore process integrity, rebuild operational judgement, or make a compromised plant safe to trust again.

OT is exactly where the limits show up

The limits of insurance become sharper in industrial settings because the real cost of failure is often operational, not merely financial. Unexpected outages in industrial processes are unacceptable, that outages often need to be planned days or weeks in advance, and that high availability requires exhaustive pre deployment testing.OT components often remain in service for 10 to 15 years, sometimes longer, and that change management is more demanding because software and firmware updates can require careful assessment and revalidation.

The insurance market itself has recognised that OT is not yet a fully mature underwriting domain. There is still a comparative lack of understanding and awareness of cyber physical risk, even as the potential for threats to bridge IT and OT is becoming more apparent. It means buyers should not assume the policy market has already solved how to price or absorb the full reality of industrial cyber exposure.

Where does insurance actually matter

It matters as an incentive mechanism.

Cyber insurance should not be viewed as a substitute for strong internal defences, but rather as a means to encourage better risk management practices. Insurance can support cyber risk management by improving quantification, providing access to expertise and crisis services, and encouraging risk reduction through premium pricing. This is the strategist’s lens that matters more. Insurance is most valuable when it changes organisational behaviour before the incident, not when it simply finances some of the damage afterwards.

Also Read: Fighting misinformation and cyberbullying against women in public sphere: Call for gender equality and online safety

That behavioural effect is already visible in underwriting logic. Coalition’s published guidance says insurers typically look for controls such as multi-factor authentication, training, tested backups, identity access management, and data classification before agreeing coverage, and that stronger controls can help firms secure more favourable rates. The market is large enough to influence buyer behaviour, and selective enough to shape which controls become non-negotiable.

The underwriting conversation should be different

The problem is that too many cyber insurance conversations still start with general IT hygiene and stop there. For industrial operators, that is not enough. The more serious opportunity is to use underwriting as a forcing function for a narrower set of OT relevant controls that genuinely reduce consequence.

A complete and accurate asset inventory is critical for managing OT risk, and that inventory data should include vendors, model numbers, firmware, operating systems, and software versions so vulnerabilities can be identified and tracked. It is also explicit that network segmentation and isolation help enforce security policies and control access to sensitive components, and that remote access should be provided only when justified, limited to business need, and supported by stronger safeguards. Tested backups are described as critical to recovery, with verification for reliability and integrity where technically possible. These are not theoretical controls. They are the foundations of whether an industrial site can contain, understand, and recover from a cyber event.

This is where insurance can become useful as a behavioural lever. If insurers and brokers start asking tougher OT questions around definitive asset inventory, segmented network zones, controlled vendor access, restoration testing, and evidence of recovery readiness, they will do more than screen risk. They will change internal priorities. Teams that struggle to win budget for resilience work often find that the conversation changes once underwriting, renewal, deductibles, or coverage conditions enter the room. That is not because insurance is replacing the engineering discipline. It is because insurance creates a commercial consequence for postponing it.

The market can also influence procurement

One of the most underused levers in OT security is procurement pressure. That is where cyber insurance could become more strategically useful over the next few years.

Operators should prioritise products and manufacturers that follow secure by design principles, and highlight issues such as logging, authentication, data protection, secure defaults, and established vulnerability management processes. That matters because insurers cannot underwrite away poor product design, but they can make weak procurement choices more visible and more expensive.

Also Read: Thailand’s cybersecurity boom has a weak core

A strategist should see the implications immediately. If policy terms, engineering standards, and procurement expectations all start pointing in the same direction, the market begins to reward firms that buy more defensible systems in the first place. That is far more valuable than arguing about claims after a major event. It shifts the conversation from “will this be covered” to “should we be accepting this exposure at all”.

What measurable risk reduction is

The weakness in many cyber insurance discussions is that they stop at broad hygiene language. Boards are told to improve resilience, but not how to tell whether risk is genuinely moving. 

In practice, a measurable reduction in OT should look less like policy paperwork and more like observable proof. Can the operator show a current inventory of critical OT assets and software versions? Can it demonstrate that high consequence zones are segmented and that permitted flows are understood? Can it prove that remote access is limited, approved, and capable of being disconnected quickly? Can it show that backups, images, and configuration states are actually restorable? Those are the sorts of measures that shorten recovery, reduce uncertainty, and make underwriting more meaningful. 

The strategist’s conclusion

Cyber insurance will not rescue OT from poor architecture, weak product choices, or years of deferred resilience work. The market itself has acknowledged limits around systemic events and around understanding cyber-physical exposure. But that does not make insurance irrelevant. It makes its real value clearer.

Its best role is to alter incentives.

It can force boards to treat OT risk as financially visible. It can force security teams to translate technical gaps into underwriting consequences. It can force operations leaders to evidence controls that otherwise remain assumed rather than proven. It can force procurement teams to take secure-by-design claims more seriously. Used that way, insurance becomes less a comfort blanket and more a discipline mechanism.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. You can also share your perspective by submitting an article, video, podcast, or infographic.

The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of e27.

Join us on WhatsAppInstagramFacebookX, and LinkedIn to stay connected.

The post Cyber insurance won’t save OT, but it can change behaviour appeared first on e27.

Leave a Reply

Your email address will not be published. Required fields are marked *