We’ve got Australian
businesses covered.

The local experts
in global cyber
risk protection.

Working with Australian businesses of all sizes, Emergence equips brokers with the tools and technology to protect their clients with ease and efficiency.

We offer three
levels of proven
protection.

Whether starting out small, thinking big or going global. Our protections scales with your business's needs.

  • 1st Aid

    – Start-ups to micro
    – 1st party protection that’s all about You
    – Affordable on any budget
    – Quick & easy process

    Click here to find out more

  • Cyber Event Protection

    – Micro to enterprise
    – Protects your revenue and your reputation
    – Response cost cover
    – 3rd Party Liability
    – Optional covers to suit your needs

    Click here to find out more

  • Cyber Excess Protection

    – For the comfort of high limit protection
    – Convenient follow form excess policy
    – Bespoke underwriting
    – Up to $20M limit
    – Backed by leading Lloyd’s Capacity

Claim examples.

Example Claim Scenario Cyber event protection solution
  • Extortion Attempt

    Claim scenario

    A malicious actor pretending to be tech support gained access to a manufacturing plant’s computer systems. This enabled them to pose as an insider, eventually gaining access to highly restricted information including customer trade secrets, bank details and other sensitive personal information. The hacker threatened to sell trade secrets to competitors and banking details on the black market, and make sensitive personal information public – unless the insured paid.

    Cyber event protection solution

    Cyber Event Protection covers key response costs including: IT forensics, crisis management and public relations, notification costs, credit and identity monitoring and pursuit costs against the perpetrator. It also covers mandatory data breach notifications, including notice to regulators because of the manufacturer’s failure to keep information secure. Defence and settlement costs for third party claims made against the insured are also covered.

  • Cryptolocker Attack

    Claim scenario

    An employee clicked on a plausible email attachment which unleashes a CryptoLocker virus. This prevented the nursing home from operating their systems.

    Cyber event protection solution

    Cyber Event Protections provides coverage for IT forensic technicians to remove the virus, restore the data and secure the IT systems. Resulting loss to the business from decreased revenue or increased costs is also covered.

  • Hacking

    Claim scenario

    A retail clothing store operated an E-commerce website which became infected with malicious code. As a result the website showed black screens to customers and staff were unable to access orders in the system.

    Cyber event protection solution

    The policy covers removal of the malware and restoration of the website. Lost revenue and extra operating expense caused by the attack are also covered.

  • Tangible Property

    Claim scenario

    A property manager’s servers suffers heat damage during a cyber attack and was no longer suitable for commercial service.

    Cyber event protection solution

    Optional Tangible Property coverage covers the cost of repair or replacement of the damaged equipment.

  • Contingent Business Interruption

    Claim scenario

    An external supplier of a bedding manufacturer suffered a CryptoWall malware attack. Their ‘Just In Time’ manufacturing plant grinds to a halt for three weeks while engineers and IT experts scramble to restore systems and production. As a result of the supplier’s cyber event, the insured could not source critical components and manufacturing operations were interrupted.

    Cyber event protection solution

    If Contingent Business Interruption cover is applicable, we would pay the bedding manufacturer’s impact on business costs arising from an outage at the external suppliers’ business.

  • Socially Engineered Theft 1st Party Loss

    Claim scenario

    An accountant’s employee receives a request from a regular supplier’s email address for payment of an outstanding invoice. The employee pays the supplier in good faith and in reliance upon the received invoice.

    As it turns out, the supplier’s invoicing system was hacked and the supplier’s bank account details were changed to the hacker’s account. The paid amount is unrecoverable as a result.

    Cyber event protection solution

    If the accountant’s policy includes Optional Cover for Criminal Financial Loss including Socially Engineered Theft, the direct financial loss to the accountant is covered, including investigation costs.

  • Socially Engineered Theft 3rd Party Loss

    Claim scenario

    A real estate agent holds third party money in trust. The agent receives instructions from a lookalike email address to transfer money to the third party’s bank account. The email is fraudulent. The agent transfers the money and, as a result, the third party funds are lost irrecoverably.

    Cyber event protection solution

    If Criminal Financial Loss coverage including Socially Engineered Theft is applicable, the lost third party funds are covered. Investigation costs are also covered.

  • Socially Engineered Theft 1st Party Loss

    Claim scenario

    A medical centre received communications from a fraudster impersonating the ATO requiring urgent payment of outstanding taxes.

    The medical centre paid the ‘outstanding’ taxes in good faith having believed the demand was genuine.

    Cyber event protection solution

    If Criminal Financial Loss coverage including Socially Engineered Theft is applicable, the lost funds are covered including investigation costs.

  • Cyber Theft Business Email Compromise

    Claim scenario

    The CFO received a fraudulent email from the CEO, whose e-mail account has been compromised due to a Cyber Event, requesting the transfer of a large sum of money. The email convinced the CFO to transfer money to a third party bank account. Later its determined that the email was not authored by the CEO, but it’s too late for the bank to stop the transfer.

    Cyber event protection solution

    Cyber Event Protection will cover forensic investiga-tion of the crime as well as response costs to remove the threat and secure the e-mail system.

    If Cyber Theft coverage is applicable, the direct financial loss the insured suffered will be covered as well.

  • Telephone Phreaking

    Claim scenario

    A marketing firm’s phone system gets hacked. The hacker creates a mailbox to route calls overseas. The unauthorised international calls result in thousands of dollars in call charges.

    Cyber event protection solution

    The policy covers the cost to investigate and remove the threat to firm’s telephone system. Our optional Cyber Theft and Telephone Phreaking Cover pays the direct financial loss to the insured.

  • Cryptojacking

    Claim scenario

    The insured notices their computers are running slower than usual. Upon further investigation, someone has hacked into their IT infrastructure to utilise the processing power to mine cryptocurrency.

    Cyber event protection solution

    Cyber Event Protection will cover response costs to remove the virus.

    If Criminal Financial Loss coverage is applicable, the increased bandwidth and electricity costs are also covered.

Be at your best - protect your clients with Emergence today.

We’re Australia’s
award-winning
cyber underwriter.

Providing specialist risk protection and smart risk prevention from a dedicated team of experts.

Discover what drives Emergence and our team of experts – making a difference to you and your clients, every day. Get to know the team, our values and the award-winning approach we take to protecting you clients business online.