Templates

Cyber Application

Cyber Application

All
Insurance
Use this template
Datapoint
Description
This is some text inside of a div block.
This is some text inside of a div block.
Business Overview
Includes the legal name of the applicant/business, a description of its nature or operations, and the date it was established.
Business Contact Information
Includes the full mailing address (street, city, state, ZIP), and direct contact details such as email and phone number.
Total Gross Revenues
Current and previous gross revenues, including a year-by-year breakdown.
Number of Employees
The total number of employees at the applicant company.
Number of IT Employees
Total internal IT staff (excluding contractors or outsourced personnel).
Number of IT Security Personnel
Number of dedicated IT security employees
Cybersecurity Point of Contact (POC)
Name, title, email, and phone of the primary cyber/IT security lead.
Network Security Controls & Provider
Includes disclosures related to firewalls, network segmentation, access control, and traffic monitoring, as well as information on whether these measures are managed by a third-party provider or in-house.
Endpoint Security Capabilities
Vendor details and technologies used for AV, EDR, XDR, and MDR.
Email Security Controls
Includes filtering, secure email gateways, phishing detection, and vendor info.
Multi-Factor Authentication (MFA)
Company wide MFA practices and requirements.
Domain Administrator Policies
Privileged access management and admin security practices.
Security Awareness & Phishing Training
Employee cyber security awareness training and phishing simulation policies.
Application Security Controls
Secure development, vulnerability scans, patching, and firewalls.
Cloud Provider
Hosting provider used for cloud-based operations.
Productivity Suite & Security
Indicates whether the applicant uses Microsoft 365, Google Workspace, or another productivity suite, and outlines the associated security tools in use.
Data Inventory & Record Volume
Includes a number of sensitive records (PII, PHI, etc.) and biometric data.
Data Protection Practices
Backup frequency, encryption, offsite copies, segmentation, and immutability.
Incident Response & Disaster Recovery
Extracts the existence and contents of formal IR/DR plans.
Loss History
Captures details about past breaches, cyber claims, or business interruptions.
IT & Security Outsourcing Details
Captures whether cybersecurity services are outsourced or managed internally.

Cyber insurance applications and related documents like Cyber Policies, E&O Applications, and E&O Quotes contain complex risk data needed for underwriting, risk scoring, and onboarding. Feathery’s AI extraction engine automates the capture of this information—eliminating manual review and enabling real-time analysis.

Feathery can extract business identifiers (legal name, contact info, gross revenues), personnel data (number of IT/security staff, cyber POC), and a wide range of cybersecurity controls—from MFA policies to endpoint detection tools, cloud providers, and backup practices. Our AI also captures loss history, IR/DR readiness, and data protection strategies.

This automation supports insurers and brokers in rapidly assessing risk posture, triaging applications, and integrating structured data into policy management or CRM systems. By replacing manual input with Feathery’s extraction workflows, teams increase underwriting speed, improve data accuracy, and reduce operational overhead.

Related templates

ACORD 25

Learn more

ACORD 26

Learn more

ACORD 27

Learn more

Cyber Policy

Learn more

Cyber Quote

Learn more