Back to blogHome

how to file a cyber insurance claim

How to File a Cyber Insurance Claim: A Step-by-Step Guide

2026-03-288 min read

Knowing how to file a cyber insurance claim before you need to

Understanding how to file a cyber insurance claim is something most policyholders never think about until they are in the middle of an incident. By that point, stress is high, systems may be down, and every hour of delay adds cost. Having a clear picture of the process before an event occurs removes uncertainty and helps your team move faster when it matters most.

The claims process for cyber insurance is different from filing a property or auto claim. Cyber events unfold in real time, involve specialized responders, and require coordination between your team, legal counsel, forensic investigators, and the insurance carrier. Knowing the steps in advance can make the difference between a controlled response and a chaotic one.

Step 1: Detect and contain the incident

The claims process begins the moment you suspect a cyber event. This could be a ransomware lockout, suspicious account activity, unauthorized data access, a phishing compromise, or notification from a vendor that their systems were breached. You do not need to confirm every detail before acting.

Your immediate priority is containment. Isolate affected systems, disable compromised accounts, and preserve evidence. Do not wipe or reformat machines before forensic analysis, because that can destroy critical evidence needed for both the investigation and the claim. Document every action you take with timestamps.

Step 2: Notify your insurance carrier immediately

Call your carrier's incident response hotline as soon as possible. Most cyber insurance policies include a 24/7 hotline number on your policy declaration page or your broker should have it readily available. Early notification is important because many policies require prompt reporting, and delays can complicate coverage.

When you call, provide a brief summary of what you know: what happened, when you discovered it, what systems are affected, and what containment steps you have taken. The carrier will assign a claims adjuster and connect you with their approved incident response panel, which typically includes breach counsel and a forensic investigation firm.

Step 3: Engage breach counsel and forensics

Breach counsel coordinates the legal aspects of the response under attorney-client privilege. This is important because communications about the incident, findings, and strategy receive legal protection that can be critical if litigation or regulatory action follows. Forensic investigators work alongside counsel to determine the attack vector, scope of compromise, and whether data was exfiltrated.

Use the carrier's approved panel for these services whenever possible. Panel firms have pre-negotiated rates with the carrier, which means faster approval and fewer billing disputes. If you engage outside firms without carrier approval, those costs may not be covered or may require additional justification during the claims review.

Step 4: Document everything throughout the process

Documentation is the foundation of a successful claim. Maintain a detailed timeline from the moment of discovery through resolution. Record every communication with the carrier, counsel, forensics, and affected third parties. Save all invoices, contracts, and expense receipts related to the incident response.

For business interruption claims, you will need to demonstrate the financial impact of the event. This includes revenue comparisons (before and during the incident), extra expenses incurred to maintain operations, and the duration of the disruption. Your finance team or accountant should begin tracking these figures immediately, not weeks later when records are harder to reconstruct.

Step 5: Cooperate with the carrier's investigation

The claims adjuster will request information throughout the process. Respond promptly and thoroughly. Carriers need forensic reports, expense documentation, proof of loss, and evidence that security representations made on the application were accurate at the time of the event.

If the carrier identifies discrepancies between your application representations and actual controls at the time of the incident (for example, you represented that MFA was enforced but it was not active on the compromised account), this can create coverage complications. Honest, accurate applications and consistent control maintenance protect both your coverage and your claim.

What the typical timeline looks like

Initial incident response (containment, counsel, forensics) typically happens within the first 24 to 72 hours. Forensic investigation can take one to four weeks depending on complexity. Breach notification, if required, usually follows within 30 to 60 days of discovery depending on applicable law.

Claim resolution timelines vary. Straightforward incidents with clear documentation may be resolved in 60 to 90 days. Complex events involving litigation, regulatory proceedings, or disputed coverage questions can take six months to a year or longer. Your broker can help set realistic expectations based on the specifics of your event.

Be prepared before the event

The best way to ensure a smooth claims experience is to prepare before an incident occurs. Keep your policy documents accessible, know your carrier's hotline number, maintain your security controls as represented on your application, and brief your leadership team on the basic response steps outlined here.

If you do not have a cyber insurance policy yet, now is the time to get one. Run a free risk scan to understand your exposure, compare carrier options, and put coverage in place before you need to file a claim. Preparation today costs minutes. Unpreparedness during an incident costs much more.

Run your free risk scan and review bindable cyber insurance options before you need to file a claim.

Start your 30-second scan and review bindable quotes