Cyber liability denial letter

You Did Everything Right. So Why Won't Your Cyber Insurer Pay?

March 18, 20268 min read

Back to RIA Tech Advisors Blog

She built her RIA over fifteen years. Two partners, a small team, and a client base that trusted her with everything. Compliance reviews on the calendar. A managed IT and cybersecurity provider handling the network. A cyber liability policy renewed without fail every year.

Then came the breach.

She did what she was supposed to do: called her cyber liability carrier first. Their approved forensic team led the investigation. Systems were restored. She filed her claim with confidence.

The denial letter arrived six weeks later.

The insurer cited insufficient documentation. No formal incident response plan on file. No records of employee security training. No written information security program. The controls may have existed in practice, but they couldn't be proven on paper. And in the world of cyber liability claims, if you can't prove it, it didn't happen.

Her story isn't unique. Neither her IT provider nor her insurer did anything wrong. They each did exactly what they were contracted to do.

The problem was the space in between.

The Problem Nobody Told You About

Most RIA owners operate under a reasonable assumption: managed IT support protects the network, cyber insurance covers the fallout. Together, they form a complete shield.

Except they don't.

There is a third category of responsibility that sits between your MSP and your insurer, and neither one owns it. It's the compliance evidence, validated controls, and audit-ready proof that regulators expect, that insurers demand, and that plaintiff's attorneys will ask for in discovery.

And it belongs entirely to you.

According to the National Association of Insurance Commissioners, nearly three times as many cyber insurance claims were closed without payment as those that were paid in 2024. The attacks were real. The damages were real. But the documentation wasn't there, and without it, the claims fell apart.

We've Seen This Before

At RIA Tech Advisors, we work with RIA firms every day. We've seen the denied claims. We've sat with owners trying to reconstruct documentation after a breach that should have been prepared long before one occurred.

We're not here to tell you that you were careless. You weren't. The system itself was never explained to you clearly.

That changes right now.

Where the Lines Are Actually Drawn

Here is the breakdown most RIA owners have never seen:

Your MSP is responsible for:

  • Managing, monitoring, and maintaining your technical environment

  • Deploying and advising on security tools and controls

  • Supporting recovery efforts after the insurer's forensic team has completed their investigation, and only within the carrier's approved vendor processes

Your cyber insurer is responsible for:

  • Dispatching approved forensic investigators to lead the post-breach investigation before any remediation begins

  • Covering qualifying financial losses after a breach occurs

  • Paying out claims, provided you can prove you met their security requirements at the time of the incident

Neither is responsible for:

  • The compliance documentation your regulators expect

  • The validated, audit-ready evidence your insurer demands before paying a claim

  • The written policies, training records, and incident response plans that prove your firm exercised due care

  • Knowing who to call first, and ensuring your team has rehearsed that sequence before a breach makes it urgent

That third column is the one that derails claims, triggers regulatory scrutiny, and ends careers. And it lands squarely on your desk.

The Plan: From Exposed to Defensible

This is precisely why we built the InControl Playbook, a proven framework designed specifically for RIAs that takes ownership of that unclaimed middle ground.

InControl works across three disciplines:

  • Assess. Credential-free scanning and penetration testing find vulnerabilities before an attacker or auditor does.

  • Prepare. Your team gets enforceable policies, a custom incident response plan that spells out exactly who to call first and in what order, security training, and post-breach communication playbooks. When something happens, no one improvises.

  • Prove. InControl generates the documented, defensible evidence your insurer actually needs: incident response plans, acceptable use policies, written information security programs, MFA validation reports, and audit-ready compliance records.

Industry data consistently shows that roughly 40% of cyber insurance claims are denied, most often because policyholders couldn't prove they met the policy's security requirements. InControl exists to make sure that never describes your firm.

The result isn't just better security. It's an active, verified, and transparent security partnership that gives you something most RIAs don't have: proof.

Two Very Different Futures

Every RIA owner reading this is standing at a fork in the road. The path they choose won't be obvious today. It becomes obvious the day a breach occurs.

Here's what the wrong path looks like.

The breach happens. You call your carrier first. Their team investigates. Systems are restored. You file your claim, and then the questions start. Your insurer wants your incident response plan. You find a template downloaded two years ago, never customized, never tested. They want training records. You have none. They want your written information security program. You have a paragraph in your employee handbook.

The denial letter doesn't come as a shock. It comes as a confirmation.

The attorneys follow. A client whose data was exposed has retained counsel. You have no documentation to counter the claim. The settlement costs more than the breach did. Your reputation, carefully built over fifteen years, becomes defined not by what you built, but by what you couldn't prove you protected.

Here's what the right path looks like.

The breach happens. You call your carrier first, exactly as your incident response plan instructs. Their team investigates while your team follows the playbook they rehearsed. No one improvises. No one makes a well-meaning mistake that compromises the investigation.

You file your claim. You send the documentation. All of it. The claim is supported. The payout comes through.

The attorney letter arrives. Your documented due diligence makes it a short conversation.

Your clients see a firm that was prepared. Some of them actually trust you more than they did before.

You are still standing. Your firm is still standing. And the gap that ended your competitor's story was closed before it ever became yours.

Your Next Step, Before the Breach

You can't outsource accountability. Neither your IT provider nor your insurer can own your compliance, satisfy your regulator, or preserve your clients' trust. That responsibility belongs to you.

Start by downloading our free Cyber Insurance Claim Approval Checklist. It shows you the documentation and controls insurers expect to see when a claim is filed, so you can find the gaps now, while there's still time to close them.

If you'd rather not go it alone, the InControl Playbook is built for exactly that. A done-with-you framework that assesses your vulnerabilities, prepares your team, and produces the documented, defensible evidence that protects your firm when regulators, insurers, or attorneys come calling.


Key Takeaways

  • Your MSP manages your technical environment. Your insurer covers qualifying financial losses. Neither one owns the compliance documentation and defensible evidence that sit between the two.

  • When a breach occurs, your first call should be to your cyber liability carrier, not your IT provider. Their approved forensic team must lead the investigation before any remediation begins.

  • Advanced services like penetration testing, incident response planning, and compliance documentation are add-ons in most MSP contracts, if options at all, not standard inclusions.

  • Nearly three times as many cyber insurance claims were closed without payment as those that were paid in 2024, according to the NAIC.

  • The documentation, validated controls, and audit-ready evidence your insurer demands are your responsibility, and most RIA firms don't have them.


Q: When a breach occurs, should I call my IT provider or my cyber liability carrier first?

A: Your cyber liability carrier should always be your first call. They will dispatch their own approved forensic team to lead the investigation. If your IT provider begins work independently before that investigation is complete, they risk destroying forensic evidence and triggering a coverage dispute.

Q: Isn't my IT provider responsible if my systems get breached?

A: Not in the way most RIA owners assume. Your provider is obligated to manage your environment professionally, but that stops well short of guaranteeing immunity. If you declined a recommended security measure, responsibility for a resulting breach typically shifts to you.

Q: If I have cyber insurance, why would my claim be denied?

A: Because having a policy and qualifying for a payout are two very different things. Insurers require documented proof of specific security controls at the time of the breach. No documentation, no payout, regardless of how real the attack was.

Q: What does "defensible security" actually mean for an RIA?

A: It means being able to prove, with documentation, that your firm took reasonable steps to protect client data. That includes written policies, a tested incident response plan, employee training records, and verified controls like MFA.

Q: How do I find out if my firm has gaps before a breach exposes them?

A: Start with the documentation your insurer would ask for if you filed a claim today. Our free Cyber Insurance Claim Approval Checklist at https://riatechadvisors.com/claimchecklist shows you exactly what insurers look for, so you can close those gaps while there's still time.

I’m Chris Meacham, founder of Now IT Works, where I’ve been helping RIAs and growing businesses turn IT headaches into IT roadmaps for nearly 30 years.

Chris Meacham

I’m Chris Meacham, founder of Now IT Works, where I’ve been helping RIAs and growing businesses turn IT headaches into IT roadmaps for nearly 30 years.

LinkedIn logo icon
Back to Blog