2. Cyber Market: Buyer-Friendly, with Signs of Tightening in 2026
It remains a good time to buy cyber insurance. Since late 2022, a buyer-friendly and well-capitalized market has made coverage more affordable globally. While the market is expected to remain soft in 2026, signs of tightening began to emerge in late 2025, driven by rising loss frequency and poor loss development in some markets.
Insurers have also identified minimum rates below which they cannot offer their maximum capacity — or, in some cases, any capacity at all — an important consideration for buyers seeking significant limits. Excessive pressure on rates may additionally drive desirable capacity away from key cyber insurers.
“Carriers, particularly the market leaders, are seeing losses accrue to a point where it is putting pressure on profitability,” says Brent Rieth, Global Cyber Leader at Aon. “They are feeling the pressure, but it is being combatted by a tremendous amount of net new insurance capacity that has come into the market over the past five years.”
Cyber Threats that are Looming Large in 2026
1. Third-Party and Supply Chain Risks
Supply chain or distribution failure is a top 10 global risk, confirmed by Aon’s Global Risk Management Survey, and is projected to remain high into 2028. High profile incidents, including CDK and Change Healthcare, exposed the scale and severity of systemic risk and business interruption impact.
When one major manufacturer’s operations were disrupted by a cyber attack, thousands of suppliers and dealers faced significant financial strain, prompting government intervention to stabilize the supply chain.
These incidents underscore a growing issue: Third-party involvement accounted for 30% of all data breaches in 2024, up from 15% a year earlier.2
Non-malicious events, including CrowdStrike, are often just as severe as a cyber attack and may be covered under a cyber insurance policy.
As supply chains expand and become more interconnected, organizations find it increasingly difficult to maintain oversight of their suppliers’ security maturity and resilience to technology outages.
“Even beginning to assess how third parties manage their risks — and what that means for your business — quickly becomes a complex web to untangle," Rieth adds. “We are going to continue to see the weakest link in the broader third-party ecosystem be a trigger for pretty severe and in some cases widespread events that impact multiple businesses at a fairly catastrophic level.”
The rapid adoption of third-party and open-source AI models has created a vast new attack surface — the AI supply chain. Vulnerabilities are often introduced as supply chains expand, especially when third-party compliance is challenging to verify or open-source code is used. Only 37% of organizations have processes to assess third-party AI tool security before deployment.3
In 2025, several research labs demonstrated that altering just 0.1% of a model’s training data could cause targeted misclassification, such as instructing an AI vision system to misidentify a stop sign. In cyber security, this could mean an intrusion-detection model misclassifying a malicious payload as benign.4