{"id":191444,"date":"2024-05-28T11:00:00","date_gmt":"2024-05-28T11:25:17","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/"},"modified":"2026-05-02T05:54:17","modified_gmt":"2026-05-02T09:54:17","slug":"ep-53-cyber-insurance-managing-risk-and-protection","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/","title":{"rendered":"EP 53 &#8211; Cyber Insurance: Managing Risk and Protection"},"content":{"rendered":"<p>In this episode of Trust Issues, we dive into the complex and rapidly evolving world of cyber insurance. We discuss the challenges and opportunities facing companies seeking to protect themselves from the ever-present threat of cyberattacks. Joining host David Puner, today\u2019s guest is Ruby Rai, Cyber Practice Leader, Canada at Marsh McLennan, who shares her insights into the current state of the cyber insurance market, its future trajectory and the key requirements companies need to meet to obtain coverage. We also explore the impact of third-party access and non-human identities on cyber insurance requirements and how companies can adopt an identity security approach to meet these requirements. Join us as we dig into the complexities of the cyber insurance market and discuss the importance of collaboration between insurers and clients in ensuring that companies have the coverage they need.<\/p>\n","protected":false},"featured_media":214008,"template":"","class_list":["post-191444","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 53 - Cyber Insurance: Managing Risk and Protection | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 53 - Cyber Insurance: Managing Risk and Protection\" \/>\n<meta property=\"og:description\" content=\"In this episode of Trust Issues, we dive into the complex and rapidly evolving world of cyber insurance. We discuss the challenges and opportunities facing companies seeking to protect themselves from the ever-present threat of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T09:54:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/\",\"name\":\"EP 53 - Cyber Insurance: Managing Risk and Protection | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg\",\"datePublished\":\"2024-05-28T11:25:17+00:00\",\"dateModified\":\"2026-05-02T09:54:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 53 &#8211; Cyber Insurance: Managing Risk and Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 53 - Cyber Insurance: Managing Risk and Protection | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/","og_locale":"fr_FR","og_type":"article","og_title":"EP 53 - Cyber Insurance: Managing Risk and Protection","og_description":"In this episode of Trust Issues, we dive into the complex and rapidly evolving world of cyber insurance. We discuss the challenges and opportunities facing companies seeking to protect themselves from the ever-present threat of...","og_url":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-05-02T09:54:17+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/","url":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/","name":"EP 53 - Cyber Insurance: Managing Risk and Protection | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg","datePublished":"2024-05-28T11:25:17+00:00","dateModified":"2026-05-02T09:54:17+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/05\/MTU1NC5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/podcasts\/ep-53-cyber-insurance-managing-risk-and-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"EP 53 &#8211; Cyber Insurance: Managing Risk and Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast\/191444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media\/214008"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=191444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}