{"id":35503,"date":"2023-09-05T15:49:27","date_gmt":"2023-09-05T13:49:27","guid":{"rendered":"https:\/\/www.accuracy.com\/?p=35503"},"modified":"2025-10-23T14:50:00","modified_gmt":"2025-10-23T12:50:00","slug":"cyberassurance-comprendre-et-evaluer-la-menace-pour-elaborer-la-bonne-police-dassurance","status":"publish","type":"post","link":"https:\/\/www.accuracy.com\/fr\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/","title":{"rendered":"Cyberassurance - Comprendre et \u00e9valuer la menace pour \u00e9laborer la bonne police d'assurance"},"content":{"rendered":"<p>Si la criticit\u00e9 du risque cybern\u00e9tique est aujourd'hui au c\u0153ur des pr\u00e9occupations de tous les acteurs \u00e9conomiques, la complexit\u00e9 technique de ce risque et l'\u00e9volution constante de la menace continuent de rendre difficile la cr\u00e9ation de produits d'assurance adapt\u00e9s aux besoins des clients et rentables pour les assureurs.<\/p>\n<p>Compte tenu des enjeux parfois vitaux auxquels sont confront\u00e9s les acteurs du march\u00e9, il est n\u00e9cessaire de r\u00e9pondre \u00e0 la question \u00e9pineuse de l'assurabilit\u00e9 des cyberrisques.<\/p>\n<p>Pour ce faire, la connaissance de la menace et la quantification financi\u00e8re doivent se conjuguer pour \u00e9laborer des sc\u00e9narios cr\u00e9dibles sur lesquels fonder les mod\u00e8les d'assurance qui permettront aux parties prenantes de se mettre d'accord.<br \/>\nAccuracy associe ses comp\u00e9tences en mati\u00e8re de mod\u00e9lisation financi\u00e8re \u00e0 la technologie de quantification des risques issue de l'analyse dynamique de la cybermenace r\u00e9alis\u00e9e par Citalid, afin d'\u00e9clairer la prise de d\u00e9cision de ses clients dans ce domaine critique.<br \/>\nLa cyber-assurance est apparue au d\u00e9but des ann\u00e9es 2000 et s'est consid\u00e9rablement d\u00e9velopp\u00e9e depuis, passant de la couverture des risques li\u00e9s aux virus et \u00e0 la perte de donn\u00e9es \u00e0 la responsabilit\u00e9 civile et aux pertes d'exploitation.<\/p>\n<p>Si le march\u00e9 mondial de l'assurance contre les cyber-risques, qui repr\u00e9sente aujourd'hui environ $9 milliards, est essentiellement capt\u00e9 par le march\u00e9 am\u00e9ricain, le m\u00eame risque vise les acteurs europ\u00e9ens qui, de ce fait, ont les m\u00eames besoins d'assurance. Cependant, la sinistralit\u00e9 \u00e9lev\u00e9e en 2020 dans le contexte d'une base de client\u00e8le tr\u00e8s \u00e9troite a conduit les assureurs \u00e0 durcir leurs conditions de mani\u00e8re g\u00e9n\u00e9rale, voire \u00e0 retirer certaines offres. En 2021, le march\u00e9 fran\u00e7ais du risque cyber repr\u00e9sente environ 220 millions d'euros de chiffre d'affaires, soit 3,1% de dommages aux biens<br \/>\ndes primes d'assurance des professionnels, \u00e9valu\u00e9es \u00e0 7 milliards d'euros sur la m\u00eame p\u00e9riode, et 0,35% du chiffre d'affaires des assurances de biens et de responsabilit\u00e9. Ce faible niveau de couverture ne concerne que 0,2% des PME, contre 9% des entreprises de taille interm\u00e9diaire et 84% des grands groupes. Pourtant, les PME sont les plus expos\u00e9es au cyber-risque ; les indicateurs disponibles tendent \u00e0 montrer que 60% des PME font faillite dans les 18 mois qui suivent une cyber-attaque.<\/p>\n<p>Le besoin d'une cyber-assurance existe, mais de nombreux facteurs entravent son \u00e9mergence.<\/p>\n<p>Tout d'abord, les cyberattaques semblent difficiles \u00e0 pr\u00e9voir et \u00e0 comprendre. Elles peuvent en effet \u00eatre entreprises de mani\u00e8re tr\u00e8s sophistiqu\u00e9e et les modes op\u00e9ratoires sont en constante \u00e9volution. La mod\u00e9lisation de sc\u00e9narios de risque cr\u00e9dibles est donc un exercice complexe.<\/p>\n<p>Deuxi\u00e8mement, le co\u00fbt des dommages caus\u00e9s par une cyberattaque peut \u00eatre consid\u00e9rable et comprend souvent des pertes financi\u00e8res, des pertes d'emploi et des pertes de revenus.<br \/>\npropri\u00e9t\u00e9 intellectuelle, violation des donn\u00e9es personnelles, atteinte \u00e0 la r\u00e9putation, etc. La quantification financi\u00e8re des sc\u00e9narios de risque est rendue d'autant plus complexe par la multiplicit\u00e9 des param\u00e8tres.<\/p>\n<p>Troisi\u00e8mement, les r\u00e9glementations en mati\u00e8re de cybers\u00e9curit\u00e9 varient d'un pays \u00e0 l'autre, ce qui rend difficile la cr\u00e9ation de produits d'assurance standardis\u00e9s pour les entreprises internationales. Les assureurs doivent \u00e9galement se conformer aux r\u00e9glementations en mati\u00e8re de protection des donn\u00e9es personnelles, ce qui les rend plus vuln\u00e9rables aux poursuites judiciaires en cas de violation de la vie priv\u00e9e.<br \/>\nEnfin, la maturit\u00e9 cybern\u00e9tique des entreprises devant \u00eatre assur\u00e9es d\u00e9pend de nombreux facteurs, en particulier de leurs syst\u00e8mes informatiques et de leurs politiques et proc\u00e9dures internes, ainsi que du comportement des utilisateurs de leurs syst\u00e8mes. L'\u00e9valuation de ces crit\u00e8res - qui n'est pas une t\u00e2che facile en soi - peut souvent \u00eatre entrav\u00e9e par la r\u00e9ticence naturelle des entreprises \u00e0 partager les d\u00e9tails de leur infrastructure informatique et de leurs politiques de s\u00e9curit\u00e9. La d\u00e9termination du niveau d'exposition au risque et des primes de risque correspondantes n'est donc pas seulement une t\u00e2che standardis\u00e9e.<\/p>\n<p>Alors que le march\u00e9 de l'assurance cyber peine \u00e0 trouver son mod\u00e8le face \u00e0 (i) un risque difficilement d\u00e9finissable et dont l'impact est difficile \u00e0 appr\u00e9hender, (ii) une base de clients assureurs en construction et (iii) un environnement r\u00e9glementaire mouvant, il est urgent de l'\u00e9clairer par des sc\u00e9narios de risques cr\u00e9dibles et une quantification financi\u00e8re solide. C'est l'objectif des travaux d'Accuracy en partenariat avec Citalid : ils visent \u00e0 identifier des sc\u00e9narios d'attaques en pr\u00e9cisant leur fr\u00e9quence et l'ampleur des pertes encourues, au regard de la vuln\u00e9rabilit\u00e9 de l'entreprise consid\u00e9r\u00e9e, gr\u00e2ce \u00e0 l'analyse de la maturit\u00e9 cyber de l'entreprise et du march\u00e9 sur lequel elle op\u00e8re.<\/p>\n<p>Les informations objectives et quantifi\u00e9es issues de ces travaux doivent permettre \u00e0 l'entreprise qui cherche \u00e0 s'assurer ou qui souhaite \u00e9valuer la qualit\u00e9 de sa couverture d'identifier la solution la plus appropri\u00e9e \u00e0 sa propre configuration. Inversement, pour l'assureur, elle contribue \u00e0 la construction d'offres pertinentes et p\u00e9rennes, ainsi qu'\u00e0 l'\u00e9valuation de l'assurabilit\u00e9 des clients.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Arthur Couvreur - Administrateur - Accuracy<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Though the criticality of cyber risk is now at the forefront of every economic actor\u2019s mind, the technical complexity of this risk and the constant changes to the threat continue to make it difficult to create insurance products that are adapted to the needs of the client and profitable for insurers. In light of what [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":35508,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[212,263,436,265,122],"tags":[174],"class_list":["post-35503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analysis","category-digital-telecommunications-analysis","category-digital-technology-software-analysis","category-financial-services-banking-insurance-analysis","category-perspectives","tag-perspectives"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy - Accuracy<\/title>\n<meta name=\"robots\" content=\"noindex,nofollow\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.accuracy.com\/fr\/cyberassurance-comprendre-et-evaluer-la-menace-pour-elaborer-la-bonne-police-dassurance\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy\" \/>\n<meta property=\"og:description\" content=\"Though the criticality of cyber risk is now at the forefront of every economic actor\u2019s mind, the technical complexity of this risk and the constant changes to the threat continue to make it difficult to create insurance products that are adapted to the needs of the client and profitable for insurers. In light of what [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.accuracy.com\/fr\/cyberassurance-comprendre-et-evaluer-la-menace-pour-elaborer-la-bonne-police-dassurance\/\" \/>\n<meta property=\"og:site_name\" content=\"Accuracy\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-05T13:49:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T12:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/09\/Cyber-assurance-cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1150\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/\"},\"author\":{\"name\":\"dev\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/person\\\/8cfdef62d7af45536d2b7b45979f72e7\"},\"headline\":\"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy\",\"datePublished\":\"2023-09-05T13:49:27+00:00\",\"dateModified\":\"2025-10-23T12:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/\"},\"wordCount\":725,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cyber-assurance-cover.png\",\"keywords\":[\"Perspectives\"],\"articleSection\":[\"Analysis\",\"Digital - Telecommunications\",\"Digital technology &amp; Software\",\"Financial services - Banking - Insurance\",\"Perspectives\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/\",\"name\":\"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy - Accuracy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cyber-assurance-cover.png\",\"datePublished\":\"2023-09-05T13:49:27+00:00\",\"dateModified\":\"2025-10-23T12:50:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cyber-assurance-cover.png\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Cyber-assurance-cover.png\",\"width\":1150,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/en_gb\\\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.accuracy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#website\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"name\":\"Accuracy\",\"description\":\"Business Advisers - Financial Consultants\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.accuracy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#organization\",\"name\":\"Accuracy\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuracy.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/unnamed-3.jpg\",\"width\":512,\"height\":512,\"caption\":\"Accuracy\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/accuracy\\\/?originalSubdomain=fr\",\"https:\\\/\\\/www.instagram.com\\\/accuracycareers\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.accuracy.com\\\/#\\\/schema\\\/person\\\/8cfdef62d7af45536d2b7b45979f72e7\",\"name\":\"dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g\",\"caption\":\"dev\"},\"sameAs\":[\"https:\\\/\\\/www.accuracy.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyberassurance - Comprendre et \u00e9valuer la menace pour construire la bonne police d'assurance - Accuracy","robots":{"index,nofollow":"noindex,nofollow"},"canonical":"https:\/\/www.accuracy.com\/fr\/cyberassurance-comprendre-et-evaluer-la-menace-pour-elaborer-la-bonne-police-dassurance\/","og_locale":"fr_CA","og_type":"article","og_title":"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy","og_description":"Though the criticality of cyber risk is now at the forefront of every economic actor\u2019s mind, the technical complexity of this risk and the constant changes to the threat continue to make it difficult to create insurance products that are adapted to the needs of the client and profitable for insurers. In light of what [&hellip;]","og_url":"https:\/\/www.accuracy.com\/fr\/cyberassurance-comprendre-et-evaluer-la-menace-pour-elaborer-la-bonne-police-dassurance\/","og_site_name":"Accuracy","article_published_time":"2023-09-05T13:49:27+00:00","article_modified_time":"2025-10-23T12:50:00+00:00","og_image":[{"width":1150,"height":550,"url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/09\/Cyber-assurance-cover.png","type":"image\/png"}],"author":"dev","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"dev","Estimation du temps de lecture":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#article","isPartOf":{"@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/"},"author":{"name":"dev","@id":"https:\/\/www.accuracy.com\/#\/schema\/person\/8cfdef62d7af45536d2b7b45979f72e7"},"headline":"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy","datePublished":"2023-09-05T13:49:27+00:00","dateModified":"2025-10-23T12:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/"},"wordCount":725,"commentCount":0,"publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"image":{"@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/09\/Cyber-assurance-cover.png","keywords":["Perspectives"],"articleSection":["Analysis","Digital - Telecommunications","Digital technology &amp; Software","Financial services - Banking - Insurance","Perspectives"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/","url":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/","name":"Cyberassurance - Comprendre et \u00e9valuer la menace pour construire la bonne police d'assurance - Accuracy","isPartOf":{"@id":"https:\/\/www.accuracy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#primaryimage"},"image":{"@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/09\/Cyber-assurance-cover.png","datePublished":"2023-09-05T13:49:27+00:00","dateModified":"2025-10-23T12:50:00+00:00","breadcrumb":{"@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#primaryimage","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/09\/Cyber-assurance-cover.png","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/09\/Cyber-assurance-cover.png","width":1150,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.accuracy.com\/en_gb\/cyber-insurance-understanding-and-assessing-the-threat-to-build-the-right-insurance-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.accuracy.com\/"},{"@type":"ListItem","position":2,"name":"Cyber insurance \u2013 Understanding and assessing the threat to build the right insurance policy"}]},{"@type":"WebSite","@id":"https:\/\/www.accuracy.com\/#website","url":"https:\/\/www.accuracy.com\/","name":"Pr\u00e9cision","description":"Conseillers d'entreprise - Consultants financiers","publisher":{"@id":"https:\/\/www.accuracy.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.accuracy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.accuracy.com\/#organization","name":"Pr\u00e9cision","url":"https:\/\/www.accuracy.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","contentUrl":"https:\/\/www.accuracy.com\/wp-content\/uploads\/2023\/08\/unnamed-3.jpg","width":512,"height":512,"caption":"Accuracy"},"image":{"@id":"https:\/\/www.accuracy.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/accuracy\/?originalSubdomain=fr","https:\/\/www.instagram.com\/accuracycareers\/"]},{"@type":"Person","@id":"https:\/\/www.accuracy.com\/#\/schema\/person\/8cfdef62d7af45536d2b7b45979f72e7","name":"dev","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1ffcac9ca2fa95ad3ec33e9be3ade82f752acb0cabe541e56c5889225afa88a?s=96&d=blank&r=g","caption":"dev"},"sameAs":["https:\/\/www.accuracy.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts\/35503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/comments?post=35503"}],"version-history":[{"count":4,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts\/35503\/revisions"}],"predecessor-version":[{"id":51726,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/posts\/35503\/revisions\/51726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/media\/35508"}],"wp:attachment":[{"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/media?parent=35503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/categories?post=35503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.accuracy.com\/fr\/wp-json\/wp\/v2\/tags?post=35503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}