Cyber & Technology

Cyber & Technology

A complete solution to inform, improve, and insure cyber and privacy risk.

A Custom Approach

    We design cyber risk management solutions that are customized to your unique organization, based on your specific exposures, risk tolerance and preferences. Rather than trying to apply a rigid model to your organization, we tailor our methods to fit your needs.

    We are committed to the highest standards of excellence in the delivery of our services to ensure an informed decision-making process that aligns with your organization’s goals and objectives.

    The Lockton Difference

    • Global resources that feel personal: Despite our global size and scale, we build relationships with each of our clients. We take time to understand their business through thoughtful and collaborative conversations to build innovative risk management and insurance solutions specifically customized to fit their needs.

    • Independence and a commitment to clients: Lockton is privately owned and independent. That means clients — not shareholders — come first. We have the freedom to be a strong, flexible advocate for you, always acting in your best interest, offering new and innovative solutions and creating an entirely different dynamic — one that’s focused on making a recognizable difference in your business.

    • Relationships and partnerships: We respect, value and nurture our relationships with clients, insurers and third-party advisors. Lockton has built strategic alliances with cybersecurity firms and insurer partners across the globe to develop comprehensive and bespoke cyber risk solutions that can benefit our clients.

    • Superior talent: Our most valuable assets are our employees. We pride ourselves on our highly ethical, moral and caring culture — and on recruiting the industry’s best talent. Our team of over 100 Associates specializing in cyber risk management are passionate about delivering unparalleled service. This broking team is supported by claims experts and former security practitioners who have deep, varied experience and are highly proficient in both insurance and cyber risk management, enabling them to deliver guidance tailored to each client’s organizational objective.

    Inform, Improve, and Insure

    A sound cyber risk management plan protects your balance sheet, preserves your reputation and enables growth in your organization. That’s exactly what Lockton’s three step approach is designed to accomplish.


    We create custom enterprise risk strategies to fit your cybersecurity goals by understanding your business operations and using analytics to quantify the financial impact of a cyber event. We also monitor how others in your industry view their risks to inform decisions about transferring cyber risk to insurance products and strengthen your cybersecurity defenses. 


    We offer tailored recommendations to improve your risk posture and build resilience. We can review your current cybersecurity posture, educate your employees, design and perform incident response exercises, help support the creation of a security governance framework, and establish policies and protocols around cyber hygiene and security. We strategically coordinate with insurers and partners to determine the best solution for your goals.


    We develop insurance solutions that fit your individual risk and potential exposures, negotiate favorable coverage terms, and provide an extra layer of protection. We work with specialized counterparts to ensure complete and coordinated coverage. Our team is with you every step of the way, guiding your organization through the entire claim life cycle. 

    Latest News & Insights

    Get the latest news and insights from Cyber & Technology

    1 / 6

    2024 Cyber Claims Outlook | An increasingly complex cyber claims landscape

    The cyber claims landscape has grown more challenging over the last decade, making organizations of all sizes and across multiple industries more vulnerable to cyber events than ever before. In Lockton’s 2024 Cyber Claims Outlook, we help you explore …

    Read Article

    Lockton’s Ransomware Playbook

    The dangers of ransomware for organizations of all types — regardless of industry, size or location — continue to intensify, and the cost of even a single event can be staggering. From the basics of how attacks work to detection, prevention and plan …

    Read Article

    A Guide to Basic Controls Demonstrating Cyber Preparedness

    The challenges created by the current cyber threat landscape continue to plague insurers, policyholders and prospective purchasers of cyber insurance. To qualify for cyber insurance, insurers require organizations to have certain basic controls and b …

    Read Article

    Online Tracking Practices Under Fire: How to stay out of class actions & data protection e …

    Class actions regarding the use of cookies, tracking pixels and other online tracking technologies on websites are one the rise and represent a serious litigation threat for businesses across several industries. Plaintiffs maintain that by using thes …

    Read Article

    Fraudulent Instruction Loss: How Crime and Cyber Insurance Policies Intersect

    Email-based fraudulent instruction scams are among the most common schemes affecting businesses today, and can be a source of significant frustration and financial loss. Crime and cyber policies represent the two most common sources of insurance reco …

    Read Article

    Understanding Technology Errors and Omissions Coverage

    Our reliance on computer technology products and services increases every day. Not surprisingly, the number of technology companies has similarly grown over time. Less obviously, businesses operating in more traditional sectors are beginning to offer …

    Read Article

    Get in touch with the Cyber & Technology Team

    Placeholder image

    Michelle Faylo

    EVP, U.S. Cyber & Technology Leader
    +1 816 912 6539