Thank you for submitting this cyber event. Shortly, you will receive an email from CYGNVS Support <support.cygnvs.com> with a unique reference number.  You may log into CYGNVS to view the status of your submission.

A member of the Marsh cyber team will be assigned to contact the client as soon as reasonably practicable. If appropriate, it is important to help the client before a member of the cyber team is assigned. Initial support and guidance we provide to our clients can have a positive impact on the outcome of a cyber event.  

First, if applicable, direct your client to the assistance services that are embedded in their cyber insurance. The client should be ready to provide a short description of the event, policy number, and their client contact information.  

Second, highlight the client’s policy requirements for engaging approved vendors to ensure coverage for vendor related expenses. Certain policies may limit or exclude coverage for non-panel vendor expenses. Alert your client to any vendor limitations as soon as possible. 

Lastly, strongly encourage the client to use CYGNVS for secure communications if there is a reasonable suspicion of system compromise. If the client turns down CYGNVS, use your best judgment while continuing communications via email. Be extremely cautious when sending policy information during a cyber extortion event.  

You may share the following guidance with your client while this event is being assigned to help set their expectations:

  1. You will receive a call from a Marsh cyber team member to discuss next steps
  2. If available, you should contact the cyber assistance hotline or email which is included in cyber insurance 
  3. Expenses incurred prior to reporting the event to the insurance-embedded cyber assistance may not be covered. Carefully review the requirements in your cyber policy.
  4. Included in your cyber insurance, there may be a panel of experienced incident response vendors that are available to assist you. The engagement of non-approved vendors may be subject to prior consent provisions and hourly rate caps. Please review your policy and the relevant cyber incident response panel. 
  5. If corporate systems are potentially compromised, do not share critical documents via email and move to out-of-band communication methods. Marsh can provide your organization with complimentary access to CYGNVS, a secure out-of-band communications platform to manage the event.