³ÉÈ˸£ÀûÊÓƵ

Cyber data, analytics, and modelling center of excellence

³ÉÈ˸£ÀûÊÓƵ Cyber Risk Intelligence Center

The ³ÉÈ˸£ÀûÊÓƵ Cyber Risk Intelligence Center is ³ÉÈ˸£ÀûÊÓƵ’s award-winning, enterprise-wide global cyber data, analytics, and modelling center of excellence. It was founded in 2021 with a mission to advance how businesses and their communities quantitatively and economically anticipate, measure, and manage cyber risk.

By leveraging advanced analytical and modelling techniques, the Cyber Risk Intelligence Center brings together ³ÉÈ˸£ÀûÊÓƵ’s expansive proprietary data and models across its Marsh, Guy Carpenter, and Oliver Wyman businesses — with complementary leading external sources — to develop a robust suite of cyber quantification tools.

These tools power cyber modelling exercises, cyber analytics, and thought leadership insights for ³ÉÈ˸£ÀûÊÓƵ clients around the world, including cybersecurity technology organizations, insurance and reinsurance providers, and others.

Hear from our team to learn more about what we do
Available services

The Cyber Risk Intelligence Center can collaborate with you in the following ways

A book icon.

Cyber Technology Studies

We can build a bespoke model to quantify the amount of risk that is reduced by a technology company’s product or solution and prepare a public-facing report with our findings.

a central node conntected to peripheral nodes icon.

Model Evaluations

We can help organizations who have built their own analytics capabilities review their modelling in detail and evaluate which third-party cyber risk model to license. References are available on request.

a square with a dollar sign in the center icon.

Loss Modelling

Our proprietary loss model, the ³ÉÈ˸£ÀûÊÓƵ Cyber Attritional Loss Model (CALM), can be ran for an individual company or a portfolio of companies. We have worked with captives, private equity firms, and others to help them understand their potential cyber exposures.

a group of people meeting icon.

Claims Reviews

After establishing an industry- and/or revenue-based set of peer companies, we can manually review the claims files of those peers and provide an anonymized synopsis of relevant cases, including common themes and loss summary statistics.

Our work
Read below to learn more about our recent work and engagements
Cyber’s sleeper threat: business email compromise
Cyber’s sleeper threat: business email compromise

In this joint research with Guy Carpenter, we studied the threats of business email compromise, how different types of businesses could be affected, and methods companies can adopt to mitigate the risk of this type of event.

In an industry first, we studied how the use of proprietary claims and incident datasets can help organizations evaluate the impact of their cybersecurity controls.

Imperva came to us to perform a study on the cost of API insecurity and bot-driven threats.

Talk to us about our services