The US market in 2025-2026
The US cyber insurance market has matured considerably. The hard market of 2021-2023 has softened, but premiums remain elevated compared to pre-pandemic levels. Underwriters now price based on your actual security posture, not just your company size. If you have strong controls, you qualify for significantly better rates.
Most US underwriters are now aligned on industry standards: NIST Cybersecurity Framework (CSF) at the foundation, SOC 2 Type II as proof of control maturity, and HIPAA compliance for healthcare. Demonstrating these controls is your fastest path to lower premiums.
High-impact controls (20-40% premium reduction each)
SOC 2 Type II certification
If your business processes customer data, provides cloud services, or handles payment information, SOC 2 Type II is now table stakes for US underwriters. A valid Type II audit report demonstrates a full year of successful control operation and gives insurers strong confidence in your environment.
- Typical premium reduction: 15-25%
- Timeline: 6-12 months to complete first audit
- Cost: $15,000-$30,000 for first audit, $10,000-$20,000 annually thereafter
- ROI: Premium savings typically pay for the audit within 12 months
US market focus
SOC 2 Type II is the single most valued control for US cyber premiums. If you can achieve it, your premium savings will dwarf the audit cost.
Multi-factor authentication (MFA) everywhere
US insurers require MFA across your entire attack surface:
- Email (Microsoft 365, Google Workspace)
- Remote access (VPN, RDP)
- Admin and privileged accounts
- Third-party SaaS applications (Salesforce, Slack, etc.)
- Backup systems
Most US brokers now ask for proof: audit logs, screenshots of MFA policy settings, or written policy documentation. Organisations with 95%+ MFA compliance see 15-20% premium reductions.
NIST CSF implementation
NIST Cybersecurity Framework (CSF 1.1) is now the default reference point for US federal agencies and large contractors. Many commercial underwriters also use it as their assessment baseline. You don't need to be formally assessed against NIST, but demonstrating alignment helps tremendously.
Focus on these NIST CSF core functions:
- Identify: Asset inventory, data classification, risk assessment
- Protect: Access controls, encryption, security training
- Detect: Logging, monitoring, endpoint detection (EDR)
- Respond: Incident response plan, communication procedures
- Recover: Backup testing, disaster recovery procedures
NIST maturity discount
Organizations demonstrating NIST CSF implementation across Identify, Protect, Detect, and Respond functions see 20-35% premium reductions compared to no framework alignment.
Endpoint Detection and Response (EDR)
US insurers now expect EDR on all endpoints. Standard antivirus is no longer sufficient. Deploy and maintain one of these platforms:
- Microsoft Defender for Endpoint
- CrowdStrike
- SentinelOne
- Elastic Security
Provide your broker with deployment stats: percentage of endpoints covered, alert response procedures, and 90+ days of monitoring logs.
Medium-impact controls (10-20% premium reduction each)
- HIPAA compliance (healthcare only): Documented administrative, physical, and technical safeguards. HIPAA Business Associate Agreements with all vendors. Typically 10-20% reduction for healthcare providers.
- Incident Response Plan: Written plan covering detection procedures, communication templates, roles and responsibilities. Better if tested annually via tabletop exercise. 10-15% reduction.
- Documented security awareness training: Quarterly minimum, with phishing simulations. Track completion rates and failed tests. 8-15% reduction.
- Regular vulnerability scanning and patching: Quarterly scans minimum. Documented patching SLA (30 days for critical, 60 for high). 8-12% reduction.
- Network segmentation: Separate business/guest networks, IT/OT networks, or departmental subnets. Reduces lateral movement risk. 10-15% reduction.
- Privilege Access Management (PAM): Separate admin accounts, just-in-time access, session recording. 10-15% reduction.
Proven backup and disaster recovery
Ransomware is the #1 cyber insurance claim in the US. Underwriters scrutinize your backup strategy intensely:
- Demonstrate the 3-2-1 rule: 3 copies, 2 different media types, 1 offsite and offline
- Evidence of successful restores within the past 12 months
- Immutable or air-gapped backups that malware cannot delete
- Documented backup testing procedures
Organisations with proven, tested backups see 15-20% premium reductions because they can recover without paying a ransom, significantly reducing insurer loss risk.
Policy structure optimisations
Increase your deductible
A simple way to lower premium: raise your deductible. Example:
- $2,500 deductible: baseline premium
- $5,000 deductible: typically 5-10% cheaper
- $10,000 deductible: typically 15-20% cheaper
- $25,000 deductible: typically 25-35% cheaper
Make sure you can cover the deductible if you have to claim.
Right-size your coverage limits
Many SMBs over-insure. Calculate your actual exposure:
- Estimated breach notification costs (based on your employee and customer base)
- Potential business interruption losses (revenue per day Γ estimated downtime)
- Regulatory/legal defence costs (estimate based on your industry)
- Ransomware extortion exposure (only if you pay ransoms β many don't)
Set your limits to match these exposures, not arbitrary amounts.
Reduce sub-limit waste
Review your policy sub-limits. If you never pay ransoms, reduce the ransomware extortion sub-limit. If you're not a SaaS company, reduce your SaaS liability. Many policies have high sub-limits on risks you won't face.
State-specific considerations
US states have wildly different regulatory environments, which affects underwriting:
- California: CCPA/CPRA compliance required for any company processing California resident data. NYDFS Cybersecurity Requirements apply if you're in financial services. Expect 20-30% higher baseline premiums.
- New York: NYDFS 23 NYCRR 500 requires MFA, encryption, breach notification within 72 hours. Healthcare providers follow HIPAA, which adds complexity to underwriting.
- Texas and Florida: Less prescriptive; baseliningly lower compliance burden. Premiums tend to be competitive.
- All states: Data breach notification laws apply. Budget for notification costs.
If you operate in multiple states, ensure your controls satisfy the strictest state where you operate.
Broker strategy
Your broker makes an enormous difference. Here's what a good US cyber broker does:
Know underwriter appetites
Different insurers have different risk appetites and rating models. Some specialise in healthcare, others in technology. Your broker should know who to approach with your specific risk profile.
Document your strengths
Don't just submit a proposal form. Attach:
- SOC 2 Type II report (if you have one)
- Evidence of MFA deployment (screenshots of policy settings)
- NIST CSF assessment (self-assessment is fine as a start)
- EDR deployment statistics (% coverage, alert response logs)
- Incident response plan
- Training completion records and phishing simulation results
- Backup testing evidence
- Vulnerability scan results
Shop multiple markets
Always get quotes from at least 3-4 different underwriters. Pricing varies wildly. One insurer might price your SOC 2 at a 20% discount; another at 10%. One might specialise in your industry and offer better rates.
The ROI calculation
A $50,000 investment in security controls might seem expensive. But the math is clear:
- Average US cyber breach cost: $5.09 million
- Small breach (1,000 records): $165,000+
- If your $50K investment saves you $20K/year on insurance, payback is 2.5 years
- Add the actual risk reduction (lower breach probability, faster recovery), and ROI is far better
Ready to reduce your premium?
A specialist US cyber broker can assess your controls and find better rates.
Get a Quote βLast updated: April 2026