Cyber Attack Plus | Cyber Insurance | Brit

Brit Cyber Attack Plus (BCAP) is our award-winning service for the unique needs of industrial and trade business.

  • Addressing gaps between the physical and non-physical, providing wide cover on a bespoke basis
  • The largest amount of cyber capacity available in the market on a primary basis
  • It’s the longest standing physical damage consortium in the London and International market
  • BCAP is a Consortium made up of Lloyd’s markets led by Brit Syndicate 2987.
  • Alignment with existing all risks wording and clear policy language, either through an
    insuring clause or through policy structure
  • Deal with one market, to deliver a significant limit and streamlined claims agreement
    process - Single claims adjustment process regardless of physical or non-physical damage

Key Coverage

Depending on the option taken, coverage could include:

    • Physical Damage
    • Business Interruption from Physical Damage events
    • Bodily Injury
    • Non Damage Business Interruption
    • Breach Response Costs
    • Data Restoration
    • Cyber Extortion
    • Privacy & Security Liability
    • Regulatory Fines and Penalties
    • PCI DSS Assessment

Key Coverage

Cyber Towers

How our cover performs - claims costs displayed are examples only

Cyber Breach Response and Claims

Cyberattacks are increasing every year and they’re becoming more complex. That’s why we believe all organisations need to be prepared. Understanding how an insurance policy can help in the event of an attack and who to turn to for immediate support is critical.

Our 24/7 Cyber Claims response service provides cover for breaches and works alongside client’s in-house IT teams to make sure your clients are well protected.

Find out more about our Cyber Claims.

Cyber Breach Response and Claims

BCAP Pize

AWARD WINNING PRODUCT

Cyber Innovation Product of the Year

We were delighted to be awarded Cyber Innovation product of the year in the Insurance Insider Cyber awards 2020

RPA Parallax1

Global privacy and cybersecurity regulations

Legislation and guidance can differ or even overlap, depending on where a business is operating. The rapid pace that technology advances also complicates things, so businesses have to stay constantly informed, while being agile enough to make changes quickly – all of which can be resource-intensive.

Read more on some of the privacy, and cyber security-related legislations here.

Read more

The threat from cyber attacks is a fast emerging and complex one which presents potential catastrophic risk and for which there is currently inadequate insurance coverage. Attacks can be committed by an array of perpetrators such as terrorists, state-sponsored agents or even disgruntled employees.

This product gives companies the vital protection and ongoing risk assessment support they need against attacks where the ramifications, financial and operationally, can be disastrous.

Russell Kennedy Managing Director - Property
Parallax Two People On Mountain

DATASAFE

Our online training and risk management platform

We deliver a service that doesn't simply insure against risk, but helps businesses to confidently take control of it. Datasafe is our online training and risk management platform.

Find out more about Datasafe

Read more

Our team

empowered to innovate, so you don't just survive but thrive

find us, keep us

Download the Brit app to get real time information on where we are and how to find us.

Icon Apple Icon Google

Maidment Ben 4648

Ben Maidment

Head of Global Cyber Privacy and Technology

Maidment Ben 4648
Read more
Bright James 2258 Web

James Bright

Class Underwriter - Cyber PD and Cyber Distribution

Bright James 2258 Web
Read more

Locations

The Leadenhall Building,
London
View Map

find us, keep us

Download the Brit app to get real time information on where we are and how to find us.

Icon Apple Icon Google

Locations

The Leadenhall Building,
London
View Map

find us, keep us

Download the Brit app to get real time information on where we are and how to find us.

Icon Apple Icon Google

Artboard – 5

Operational Technology (OT): Protecting Critical Systems in a Connected World

19-06-2024 |Cyber
Read more
Woman working on a computer with digital screens in view

Digital Forensics:
Managing a Digital Crime Scene

19-09-2024 |Cyber
Read more
Breach Counsel Teaser

Breach response: leave it to the experts

23-07-2024 |Cyber
Read more
Ai Snippet

Risk Versus Reward: Using AI In Business

22-05-2024 |Cyber
Read more
Cyberpam Header

How cybercriminals exploit MFA reset prompts

25-04-2024 |Cyber
Read more
Ransomware Fullbleed1

Ransomware negotiation: Don’t try this at home

18-03-2024 |Cyber
Read more
Adcybergap Pageimg

Addressing The Cyber Gap With SMEs

29-01-2024 |Cyber
Read more
NIS2 Header

Brit - NIS2: What does it mean for cyber security?

30-11-2023 |Cyber
Read more
DT

The Cyber Security Threat from Digital Twins - Brit

30-11-2023
Read more