Application Readiness · Control Mapping · Premium Reduction

Cyber Insurance Readiness & Compliance ServicesPass the Underwriter Questionnaire. Lower the Premium. Keep the Coverage.

Cyber liability insurance underwriters now demand specific, attestable controls before they bind a policy. Specifically, they want MFA on every account. EDR on every endpoint. Immutable backup. A written incident response plan. A documented vendor risk program. On-Site Technology runs the readiness engagement that maps your environment to the questionnaire, closes the gaps that put your policy at risk, and produces the evidence package your broker needs at renewal. Delivered for businesses across NJ, NY, PA, and FL.

NIST CSF 2.0 alignedCIS Controls v8 mappedBroker-ready evidence packNJ · NY · PA · FL
Request a Readiness Scoping Call
Tell us your renewal date, your carrier, and what you have in place. We will respond with a scoped proposal. We typically reply within 4 business hours.

    Your Name (required)

    Your Email (required)

    Subject

    Your Message

    Your info stays with us. No resale.
    Quick Answer

    Cyber insurance readiness is a structured engagement that prepares a business to qualify for, renew, or reduce the premium on a cyber liability insurance policy. Specifically, the work maps the carrier’s underwriting questionnaire to the controls your environment actually has in place, identifies the gaps that would trigger denial, exclusion, or sub-limit, and then remediates them in priority order.

    A complete program covers multi-factor authentication scope, endpoint detection and response (EDR) coverage, immutable and offsite backup, a written incident response plan with at least one tabletop exercise, vendor risk management, security awareness training, vulnerability and patch management, privileged access controls, network segmentation, and 12-month log retention, all mapped to NIST CSF 2.0 and CIS Controls v8. Additionally, On-Site Technology delivers the engagement for mid-market businesses across NJ, NY, PA, and FL, working alongside your broker to produce the evidence package underwriters now require. The ongoing security stack that backs the controls lives in our Managed Cybersecurity service.

    12
    Underwriting controls
    we map and remediate
    4–8 wk
    Typical engagement
    before renewal
    100%
    Broker-ready evidence
    package on completion
    5-Step
    Discover, gap, plan,
    implement, attest
    What Underwriters Actually Want to See

    Six Things Carriers Now Ask Before Binding a Policy

    The 2026 cyber insurance application is a controls audit in questionnaire form. Notably, carriers have tightened underwriting after years of ransomware losses, and the supplemental ransomware questionnaire is now standard for any business above roughly fifty employees. Each of the six asks below is a frequent denial trigger when answered incorrectly or unsupported by evidence.

    MFA on Everything That Authenticates

    Email, VPN, remote desktop, privileged accounts, and any cloud admin console. Importantly, the 2026 supplemental ransomware questionnaire treats partial MFA as no MFA. A “yes, except for the service accounts” answer is a denial answer.

    EDR or MDR on Every Endpoint

    Signature antivirus is no longer a credible answer. Furthermore, underwriters now expect endpoint detection and response, or managed detection and response, with 24/7 monitoring and roll-back capability. Coverage gaps on servers and remote laptops are scored heavily.

    Immutable, Offsite, Tested Backup

    The 3-2-1-1-0 rule is the underwriter benchmark: three copies, two media, one offsite, one immutable, zero recovery errors. In other words, a backup that a domain admin can delete is a backup the carrier scores as none.

    Written IR Plan With Tabletop Evidence

    A document on a shared drive is not enough. Typically, carriers ask for the date of your most recent tabletop exercise, who attended, and what changed in the plan as a result. NIST SP 800-61 Rev. 2 is the structural reference most underwriters benchmark against.

    Security Awareness Training With Phishing Simulation

    A documented program with quarterly phishing simulations, click-rate metrics, and remedial training for repeat offenders. Carriers want the dashboard, not just a policy stating that training happens.

    Vendor Risk Management Program

    Carriers now look for a documented inventory of critical vendors, contractual security requirements, and a process to review SOC 2 reports or equivalent attestations. Supply-chain breach is the underwriter’s top concern after ransomware.

    The 12-Control Readiness Framework

    Twelve Controls That Drive Most Cyber Insurance Decisions

    However, carrier questionnaires vary in wording, and they ultimately converge on the same control set. To make this manageable, we group the twelve into four practice domains so the gap analysis is scannable for executives and actionable for the IT team. Each one is mapped to NIST CSF 2.0 functions and CIS Controls v8 safeguards in the deliverable.

    Identity & Access

    The first surface every carrier audits. Also worth noting: privileged accounts, conditional access, and admin separation get the heaviest weight on the questionnaire and the biggest premium move when remediated.

    • MFA on all user, admin, and service accounts
    • Privileged access management (PAM) for domain admins
    • Conditional access policies and risk-based sign-in

    Threat Detection & Response

    The active controls that contain an incident before it becomes a claim. In particular, EDR coverage gaps and missing log retention are the two patterns most likely to drive a sub-limit on the ransomware sub-line.

    • EDR or MDR on every endpoint and server
    • Centralized log retention for at least 12 months
    • 24/7 monitoring with documented escalation

    Resilience & Recovery

    The controls that keep ransomware from becoming a total loss. Because the loss size is what carriers actually pay, they underwrite the recovery posture as heavily as the prevention posture.

    • Immutable, offsite, encrypted backup (3-2-1-1-0)
    • Tested restore procedures and documented RTO/RPO
    • Written incident response plan with annual tabletop

    Governance & Hygiene

    The programmatic controls that prove the security stack is actually run, not just installed. In short, patch cadence, training metrics, and vendor reviews are the audit trail underwriters want to see.

    • Vulnerability scanning and patching cadence
    • Security awareness training with phishing simulation
    • Vendor risk management and SOC 2 review process
    Eight Question Categories on the 2026 Application

    What the Underwriting Questionnaire Actually Covers

    However, wording varies by carrier. The 2026 cyber insurance application still converges on these eight question groups across the main and supplemental forms. Most major carriers (Coalition, Travelers, Chubb, Beazley, AIG, Hartford, AXIS, Liberty Mutual) draw from the same control taxonomy, which is why a control-mapping engagement compresses across renewal cycles.

    Authentication & Identity

    MFA scope, conditional access, password policy, privileged account separation, and remote access methods.

    Endpoint & Network

    EDR/MDR coverage, antivirus posture, firewall configuration, network segmentation, and remote access security.

    Backup & Recovery

    Backup architecture, immutability, offsite copies, encryption, restore testing cadence, and documented RTO/RPO.

    Incident Response

    Written IR plan, tabletop exercise dates, breach notification procedure, and outside counsel/forensics relationships.

    Email & Phishing

    Secure email gateway, DKIM/SPF/DMARC, attachment sandboxing, and outbound wire transfer verification controls.

    User Awareness

    Onboarding training, ongoing awareness curriculum, simulated phishing program, and remediation for repeat clickers.

    Vendor & Supply Chain

    Critical vendor inventory, SOC 2 review process, contractual security requirements, and software bill of materials.

    Governance & Records

    Written policies, prior incidents disclosure, regulatory regime, and revenue/PII volume thresholds for sub-limits.

    Where Policies Pay Less Than Expected

    Four Reasons a Bound Policy Still Underpays a Claim

    First, a signed declaration page is not a guarantee. Cyber policies have layered limits, sub-limits, retentions, exclusions, and warranty conditions tied to the answers on the original application. Readiness work is partly about closing control gaps, and partly about understanding the policy mechanics so the broker can negotiate the right structure for the actual risk.

    Application Misstatement

    If the answers on the application overstate your control posture, the carrier can rescind coverage or deny the claim under the misrepresentation clause, even after years of paid premiums. Indeed, the 2024 Travelers v. ICS case is the cautionary tale every broker now cites.

    Readiness fix: answers are evidence-backed before the application is submitted.

    Sub-Limits on the Big Loss Categories

    For example, a policy with a 5 million dollar aggregate may carry a 250,000 dollar sub-limit on social engineering, a separate sub-limit on ransomware, and a coinsurance percentage on extortion payments. The headline limit is rarely the limit that pays your loss.

    Readiness fix: we map your loss scenarios against the structure before binding.

    Exclusions and Warranty Conditions

    Common exclusions include unpatched known vulnerabilities, end-of-life software in production, prior knowledge of the incident, and acts of war or state-sponsored activity. Moreover, warranty conditions in some 2026 policies make MFA enforcement a coverage prerequisite.

    Readiness fix: we review exclusion and warranty language with your broker before binding.

    Retention and Coinsurance Shock

    Retention is the cyber-policy version of a deductible, and on a major incident it is often six figures. Additionally, coinsurance can require the insured to absorb 10 to 20 percent of the loss above retention. Both are negotiable at renewal when the control posture supports it.

    Readiness fix: remediated controls give the broker leverage to negotiate retention and coinsurance down.

    The OST Readiness Methodology

    From Questionnaire to Bound Policy in Five Phases

    Generally, phases run in sequence on a first engagement and then loop annually for ongoing readiness. Aligned to NIST CSF 2.0 functions and CIS Controls v8 Implementation Group 2 safeguards, with the deliverable structured for direct use by your broker.

    1

    Discovery

    We pull your in-force policy, the prior application, the renewal questionnaire, and a current asset inventory. Then, stakeholder interviews with IT, finance, and compliance establish authority and timeline.

    2

    Gap Analysis

    Each questionnaire item is mapped to the actual control state in your environment. Then, gaps are scored by underwriter weight and remediation cost, and ranked into a prioritized worklist.

    3

    Remediation Plan

    A written plan with owners, dates, and dollars. First, quick wins land before the broker submits. Longer-cycle items get a documented roadmap that satisfies underwriters with reasonable in-flight remediation.

    4

    Implementation

    Often, we deploy MFA, EDR, immutable backup, IR plans, and the rest, working alongside your IT team or our Managed Cybersecurity stack. Tabletop exercises run on the new plan to generate the evidence underwriters now require.

    5

    Attest & Submit

    Each application answer is supported by an evidence artifact in the broker package: policy text, screenshot, log sample, training dashboard, or training certificate. As a result, the broker submits with confidence and renewal cycles compress.

    Where Industry Adds Layer to the Application

    Industry Considerations on the Cyber Application

    Typically, most carriers run an industry-specific supplemental questionnaire on top of the standard application. While the control set is the same, but the regulatory overlay, sub-limit structure, and disclosure obligations shift depending on what the business does and what kind of data it touches.

    Manufacturing & Distribution

    OT and IT segmentation, ERP recovery posture, and supplier/EDI continuity are the focus. Notably, business interruption is the largest cyber loss category in this segment, so RTO discipline drives more of the premium than encryption.

    Layered with NIST SP 800-82

    Healthcare & Life Sciences

    HIPAA security and breach notification rules, PHI volume thresholds, and EHR vendor risk. Furthermore, carriers ask for the date of your last HIPAA Security Rule risk analysis and the cadence of your business associate agreement reviews.

    Layered with HIPAA & HITECH

    Financial & Professional Services

    GLBA Safeguards Rule, NYDFS 23 NYCRR 500 for NY-licensed entities, and SEC cyber disclosure for advisers. In addition, wire-fraud and social-engineering sub-limits drive the actual coverage analysis here, not the headline aggregate.

    Layered with NYDFS 500 & GLBA

    Defense & Government Contractors

    CMMC 2.0 Level 2, NIST SP 800-171 controls, and the DFARS 252.204-7012 incident reporting clock. Importantly, the CMMC control set already maps to most carrier asks, so an active CMMC readiness program compresses the cyber insurance work.

    Layered with CMMC 2.0 & NIST 800-171
    Why On-Site Technology

    Six Reasons Brokers Send Their Clients to OST

    Because cyber insurance readiness is the rare engagement where the consultant has to be fluent in policy structure, control implementation, audit evidence, and the operational reality of running a business, the bench matters. Specifically, we have built this practice on the same MSP/MSSP foundation that delivers the controls every day, which is why brokers across NJ, NY, PA, and FL refer renewal cases to us.

    Questionnaire-Fluent

    We have read the major carrier applications side by side. As a result, we know which questions carry weight on premium, which trigger sub-limits, and which trip warranty conditions when answered incorrectly.

    MSP and MSSP Under One Roof

    We can identify the gap, deploy the control, and run it day-to-day. Consequently, there is no three-vendor handoff between consultants, integrators, and operators. Implementation lives in the same team that wrote the gap analysis.

    Evidence Pack the Broker Can Submit

    Every application answer is backed by a screenshot, log sample, or policy excerpt. In practice, brokers tell us this is the package that lets them shop the risk to multiple carriers and drive a competitive renewal.

    Framework-Mapped Deliverables

    Every gap analysis row is tied back to NIST CSF 2.0 functions, CIS Controls v8 safeguards, and where applicable, HIPAA, NYDFS 500, GLBA, PCI DSS 4.0, or CMMC 2.0 Level 2 controls. One body of work covers multiple regulatory regimes.

    Renewal-Cycle Aware

    We scope around your renewal date and broker submission timeline. Quick wins land before submission. Longer-cycle remediation gets a roadmap underwriters accept as in-flight, so the policy binds without exclusion.

    NJ · NY · PA · FL Footprint

    Engineering capacity in Northern NJ, the NYC metro, Pennsylvania, and South Florida. Additionally, we can be on-site for activation, control verification, or executive readout, and we already work with broker networks across all four states.

    Frequently Asked Questions

    Cyber Insurance Readiness: FAQs

    The questions CFOs, brokers, and IT directors ask us most often before scoping a readiness engagement.

    What is cyber insurance readiness?

    Cyber insurance readiness is a structured engagement that maps a carrier’s underwriting questionnaire to the controls actually in place across your environment, identifies the gaps that would trigger denial, exclusion, or sub-limit, and remediates them in priority order. The deliverable is a broker-ready evidence package that supports each application answer with a policy excerpt, screenshot, log sample, or training record. Readiness work compresses across renewal cycles because once the control set is documented, the next renewal becomes an attestation refresh rather than a rebuild.

    What controls do cyber insurance carriers require in 2026?

    The 2026 underwriting baseline converges on twelve controls across four practice domains: identity (MFA on all accounts, privileged access management, conditional access), threat detection (EDR or MDR on every endpoint, 12-month log retention, 24/7 monitoring), resilience (immutable offsite backup per the 3-2-1-1-0 rule, tested restore procedures, written incident response plan with annual tabletop), and governance (vulnerability and patch management, security awareness training with phishing simulation, vendor risk management with SOC 2 review). Most carriers map these to NIST CSF 2.0 functions or the equivalent CIS Controls v8 safeguards.

    Why was my cyber insurance application denied or non-renewed?

    The most common reasons for denial or non-renewal in 2026 are missing or partial MFA on privileged accounts, signature antivirus instead of EDR or MDR, backup that is not immutable or not tested, and no documented incident response plan with a recent tabletop. A prior incident or a competitor’s incident in your industry can also push a carrier off the risk. The fix is a readiness engagement that closes the underlying gaps and produces evidence the next carrier’s underwriter will accept. We work with your broker to shop the renewal once the control posture is in shape.

    How long does a cyber insurance readiness engagement take?

    A typical engagement runs 4 to 8 weeks from kickoff to broker-ready evidence package. Discovery and gap analysis take 2 to 3 weeks. Implementation depends on the gap list, but the highest-impact fixes (MFA on remaining accounts, EDR on uncovered endpoints, immutable backup, IR plan with first tabletop) are usually deployable in 2 to 4 weeks with the right project authority. Larger remediation items (network segmentation, PAM rollout, SIEM tuning) can extend, but underwriters typically accept a documented in-flight roadmap and bind the policy on that basis.

    Is multi-factor authentication required for cyber insurance?

    Yes, on every account that authenticates. The 2026 supplemental ransomware questionnaire treats partial MFA as no MFA. Carriers want MFA on email, VPN, remote desktop, all administrative consoles (Microsoft 365, Azure, AWS, on-premise domain), and on remote access for vendors. Service accounts and break-glass accounts are now expected to use modern phishing-resistant methods such as FIDO2 keys or certificate-based authentication. Some 2026 policies have moved MFA from a question into a warranty condition, meaning a verified MFA failure at the moment of incident can void coverage entirely.

    What is the difference between cyber liability insurance and cyber insurance readiness?

    Cyber liability insurance is the policy your broker places. It pays for incident response, forensics, business interruption, extortion, regulatory fines, and third-party liability up to the policy limits. Cyber insurance readiness is the consulting engagement that prepares you to qualify for that policy on favorable terms, by mapping your environment to the underwriting requirements and remediating the gaps. The broker sells the policy. We get you ready to qualify for it. Both functions are necessary, and we work alongside whichever broker you have.

    Do I need EDR or just antivirus for cyber insurance?

    EDR or MDR. Signature-based antivirus is no longer a credible answer on a 2026 application. Carriers are looking for behavior-based detection, response capability (not just alerts), and roll-back of malicious actions. Coverage on every endpoint and server is the bar, with documented monitoring and response. Microsoft Defender for Endpoint, SentinelOne, CrowdStrike, and similar platforms all qualify when properly configured and monitored. The difference between “deployed” and “monitored” is what carriers actually score, which is why our engagements include an MDR layer when the in-house team cannot staff 24/7.

    Will a tabletop exercise actually lower my cyber insurance premium?

    A documented tabletop exercise within the last 12 months is now table-stakes for the application, but the bigger premium lever is what changes in the IR plan as a result. Carriers ask for the date of the most recent tabletop and what was updated afterward. A tabletop that surfaces real gaps, gets documented, and drives plan revisions tells the underwriter that the program is operated, not just installed. We facilitate the exercise, capture the after-action notes, and roll the changes into the IR plan so the renewal answer carries weight.

    What happens if my answers on the cyber insurance application are wrong?

    Misstatements on a cyber insurance application are the most preventable cause of claim denial. Carriers can rescind the policy under the misrepresentation clause, deny a specific claim, or reclassify the loss into a sub-limit category. The 2024 Travelers v. ICS case was a watershed because the court upheld rescission based on application answers about MFA. The fix is to make every application answer evidence-backed before submission. Our readiness engagement attaches a verifiable artifact to each answer, which protects the policy holder and gives the broker leverage to negotiate.

    Do small businesses really need cyber insurance readiness consulting?

    Yes, especially under fifty users. The carrier expectation set is the same regardless of size, but smaller IT teams have less bandwidth to translate the questionnaire into action. A readiness engagement at the small-business end of the market is typically faster (4 to 6 weeks) and lighter (the gap list is shorter), and the premium impact tends to be larger as a percentage. Insurance for businesses with 10 to 100 users has hardened the most in the past two renewal cycles, so the upside on readiness is highest in this segment.

    Can On-Site Technology help with our renewal questionnaire even if you are not our MSP?

    Yes. The readiness engagement is independent of who delivers your day-to-day IT. We work with your existing internal team or your incumbent MSP, run the gap analysis, and produce the evidence package. If the implementation requires controls your current provider cannot deliver (EDR or MDR coverage, immutable backup, 24/7 monitoring, tabletop facilitation), we can layer those in through our Managed Cybersecurity service without taking over the broader IT relationship. Many of our readiness engagements run alongside an existing MSP partnership.

    How does cyber insurance readiness fit with CMMC, HIPAA, PCI, and NYDFS compliance?

    There is heavy overlap. Most controls a cyber insurer wants are also required by HIPAA Security Rule, PCI DSS 4.0, NYDFS 23 NYCRR 500, GLBA Safeguards, and CMMC 2.0 Level 2. We map the readiness gap list to the regulatory frameworks the business is already subject to, so the same remediation work serves the cyber application and the audit posture. For DoD contractors, an active CMMC readiness program typically covers 70 to 80 percent of the cyber insurance application out of the box.

    Ready to Scope Your Readiness Engagement?

    Tell Us About Your Renewal

    Share your carrier, your renewal date, and what you have in place. Typically within 4 business hours, we will reply with a scoped proposal that lines up with your broker submission. We typically respond within 4 business hours.

      Your Name (required)

      Your Email (required)

      Subject

      Your Message

      Your info stays with us. No resale.
      Pass the Questionnaire. Lower the Premium.

      Ready When the Underwriter Is

      Bring us the questionnaire, the in-force policy, or just a renewal date on the calendar. We will scope a readiness engagement that matches your broker submission window.