Residual Risk Is Why Insurance Exists

Security reduces risk. It never eliminates it. The gap between what controls can achieve and what remains is residual risk — the entire reason cyber insurance exists. And it is the most under-discussed concept in the industry.

Security reduces risk. It never eliminates it. The gap between what controls can achieve and what remains is residual risk — the entire reason cyber insurance exists. And it is the most under-discussed concept in the industry.

There is a concept that sits at the exact intersection of cybersecurity and insurance. It explains why the two disciplines need each other, why their practitioners talk past each other, and why the cyber insurance market is simultaneously growing and struggling.

That concept is residual risk — the risk that remains after all controls are applied.

It is, by definition, the reason insurance exists. And it’s the least discussed concept in either field.

The Risk Reduction Illusion

Security teams live in the reduction business. Every control, every policy, every tool is designed to reduce risk:

  • Firewalls reduce the attack surface
  • MFA reduces the probability of credential-based intrusion
  • EDR reduces dwell time after compromise
  • Backup reduces the impact of ransomware

Collectively, these controls reduce what security professionals call inherent risk — the total risk exposure before any mitigation. The result is residual risk — what’s left.

The formula is simple:

Residual Risk = Inherent Risk − Risk Reduction from Controls

But here’s what security professionals don’t always acknowledge, and what underwriters know implicitly: residual risk is never zero.

No combination of controls eliminates all risk. There is always a gap between full protection and what’s achievable. That gap — the irreducible remainder — is where insurance operates.

Why Security and Insurance Talk Past Each Other

The communication failure between security teams and underwriters is fundamentally a disagreement about residual risk:

PerspectiveSecurity TeamUnderwriter
FocusRisk reductionRisk transfer
QuestionHow much can we reduce?What remains after reduction?
MetricControls implemented, threats blockedLoss expectation, VaR
AssumptionMore controls = less riskMore controls = lower residual risk, but never zero
LanguageThreats, vulnerabilities, controlsPremium, deductible, exposure, limit

Security teams present controls as evidence that risk is managed. Underwriters hear that and ask: “Managed, yes. But what’s left?” The security team says “we have MFA, EDR, and SIEM.” The underwriter translates that to “controls reduce LEF by approximately 30-60% depending on implementation quality” — and then calculates the remaining exposure.

Neither side is wrong. They’re looking at the same risk from opposite ends of the equation.

The Quantification Problem

The core issue is that most organizations can’t quantify their residual risk. They know their controls. They know their inherent risk (roughly). But they can’t express the difference in financial terms.

Here’s what that looks like in practice:

Scenario: A 500-employee manufacturing company asks: “How much cyber risk do we actually carry after our controls?”

Typical answer: “We’ve implemented NIST CSF, have SOC 2 Type II, and use managed detection and response. We’re well-protected.”

Useful answer: “Our inherent risk from ransomware is LEF 0.20–1.00, loss magnitude €200K–€5M. Our controls (MFA, EDR, offline backups, incident response plan) reduce LEF by approximately 60% and loss magnitude by 40%. Residual LEF: 0.08–0.40. Residual loss magnitude: €120K–€3M. Annualized residual risk exposure at VaR 95: €870K.

The second answer tells an underwriter something they can use. The first tells them nothing.

FAIR quantification makes residual risk visible. Without it, you’re negotiating premium and deductible in the dark.

Residual Risk as an Underwriting Input

For underwriters, residual risk is the actual insurable quantity. Here’s how it maps to policy terms:

Policy ElementResidual Risk Connection
PremiumProportional to annualized loss expectation (ALE) from residual risk
DeductibleCalibrated to absorb low-severity residual risk events the insured should retain
SublimitsApplied where residual risk concentrations are high (e.g., supply chain, AI)
ExclusionsApplied where residual risk is unquantifiable or infinite (e.g., war, intentional acts)

Every pricing decision an underwriter makes is implicitly a decision about residual risk. The question is whether that decision is informed by quantified analysis or by qualitative judgment.

When residual risk is quantified:

  • Dynamic pricing models can replace flat premiums with risk-adjusted rates that reflect actual exposure
  • AI risk loading of 10-15% can be replaced with risk-specific sublimits tied to modelled AI exposure
  • The underwriting visibility gap narrows — because quantified residual risk provides the data point that application forms miss

The NIS2 and DORA Connection

Regulatory frameworks are increasingly requiring organizations to acknowledge and manage residual risk — even if they don’t use that term.

  • NIS2 Article 21 requires “appropriate and proportionate” security measures. Proportionality implies a risk-based approach: more risk → more measures. But the regulation also implicitly acknowledges that measures have limits — Article 20 holds management personally liable for inadequate risk management, not for eliminating risk entirely. The standard is reasonableness, not perfection.

  • DORA Article 11 requires financial institutions to define “risk tolerances” for ICT risk. A risk tolerance is, in plain language, a statement of acceptable residual risk — the level at which an organization says “we accept this remaining exposure.”

  • GDPR Article 32 requires “appropriate technical and organisational measures” considering “the risk.” Not eliminating the risk. Managing it to an acceptable level — which means acknowledging what remains.

The regulatory trajectory is toward explicit residual risk management. Organizations that can quantify it will be better positioned for compliance, for insurance placement, and for board-level risk conversations.

Closing the Loop

Residual risk connects security and insurance in a feedback loop:

  1. Security reduces inherent risk through controls → produces residual risk
  2. Insurance transfers residual risk via premium and deductible → financial protection for what remains
  3. Claims data feeds back to recalibrate residual risk estimates → improved quantification
  4. Improved quantification enables better security investment decisions → more efficient risk reduction

When this loop operates, both functions improve. Security teams invest in controls that reduce the highest-LEF, highest-magnitude risks. Underwriters price based on measured residual exposure rather than industry averages.

When it doesn’t operate — when security and insurance work in isolation — both functions deteriorate. Security teams over-invest in low-impact controls. Underwriters over-price for unquantified uncertainty. The market becomes less efficient, and the organizations that need coverage most struggle to get it.

The Takeaway

Next time you’re evaluating a cyber risk — as a security professional or an underwriter — ask three questions:

  1. What is the inherent risk? (Before controls)
  2. How much do controls reduce it? (Quantified, not assumed)
  3. What remains? (Residual risk — the part that matters)

If you can answer question 3 in euros, you have something both security and insurance can work with. If you can’t, you’re both guessing.

That’s what the risk register is for — making residual risk visible, quantified, and actionable. Not as an audit artifact, but as the fundamental input to every risk decision an organization makes.

Insurance doesn’t exist to cover inherent risk. That’s what security is for. Insurance exists to cover what’s left.


Michael Guiao is the Founder of Resiliently.ai and the author of Resiliently. He holds CISM, CCSP, CISA, and DPO (TÜV) certifications and has 8+ years of experience across insurance, auditing, and consulting at firms including AXA, Xella Group, and PwC.

Get the full picture with premium access

In-depth reports, assessment tools, and weekly risk intelligence for cyber professionals.

Single Report

€9 per report

24-48 page professional analysis

Browse Reports →
Best Value

Pro Membership

€49 €19 /month

Founding member price — lock it in forever

Unlimited reports + tools + alerts

Subscribe Now →
30-day money-back
Secure via Stripe
Cancel anytime

Free NIS2 Compliance Checklist

Get the free 15-point PDF checklist + NIS2 compliance tips in your inbox.

No spam. Unsubscribe anytime. Privacy Policy

blog.featured

An AI Agent Deleted a Startup's Production Database — Can You Insure Against That?

AI Agents ·

7 min read

Why Your Cyber Risk Register Is Lying to You — And What to Do About It

Risk Register ·

9 min read

Zurich's £8.1B Beazley Acquisition: What It Means for Cyber Insurance's Future

Cyber Insurance ·

6 min read

NIS2 Penalties Explained: Essential vs Important Entities and What They Mean for Coverage

NIS 2 ·

9 min read

Premium Report

2026 Cyber Risk Landscape Report

24 pages of threat analysis, claims data, and underwriting implications for European cyber insurance.

View Reports →

Verwandte Artikel

Agentic Security: What Underwriters Need to Know in 2026
Agentic AI · · 8 min read

Agentic Security: What Underwriters Need to Know in 2026

Autonomous AI agents are entering production at scale — and they bring a completely new attack surface that traditional cyber insurance questionnaires weren't designed to capture.

An AI Agent Deleted a Startup's Production Database — Can You Insure Against That?
AI Agents · · 7 min read

An AI Agent Deleted a Startup's Production Database — Can You Insure Against That?

PocketOS lost its production database to a Cursor AI agent in 9 seconds. The incident exposes a gap in cyber insurance that most policies don't cover: AI-caused operational destruction with no external attacker.

Living-Off-the-Land 2.0: How Autonomous AI Agents Are Weaponizing LOTL Tradecraft — And What It Means for Cyber Underwriting
AI Agents · · 9 min read

Living-Off-the-Land 2.0: How Autonomous AI Agents Are Weaponizing LOTL Tradecraft — And What It Means for Cyber Underwriting

The convergence of agentic AI and living-off-the-land attack techniques is collapsing three attacker constraints at once: cost, skill, and detectability. A deep analysis of demonstrated capabilities, real incidents, and the underwriting implications that should reshape your risk selection in 2026.