Cyber Insurance for Community Banks: What It Covers, What It Doesn't, and What Your Board Should Be Asking

Your bank has a cyber insurance policy. It’s on the books. The premium gets paid. The Board sees it listed in the risk management report.

But when was the last time anyone checked what your cyber policy actually covers?

I review cyber policies for clients, and the most common reaction I get from bank leadership is some version of:

“Wait, that’s not covered?”

The problem isn’t that community banks buy bad cyber policies. It’s that cyber insurance was designed for companies that store data and run a single network. Community banks hold financial data, process transactions, move money, depend on third-party vendors, and answer to regulators. Different risk profile. Your policy should reflect it.

Here’s how to tell if it does.

What Cyber Insurance Actually Covers for a Community Bank

A cyber policy has two sides: first-party coverage (your own losses) and third-party coverage (when someone sues you).

First-Party Coverage
Your own losses
  • Breach response: Forensics, legal counsel, notification, credit monitoring. Even a few hundred records can run into six figures.
  • Business interruption: Lost income and extra expenses while systems are down, after a waiting period (usually 8 hours).
  • Cyber extortion/ransomware: Ransom payments, negotiation, forensic support.
  • Data restoration: Recovering or recreating data destroyed during an attack.
Third-Party Coverage
When someone sues you
  • Network security liability: Defense costs and settlements when a security failure causes harm to a third party.
  • Privacy liability: Claims from failure to protect personal information.
  • Regulatory proceedings: Defense costs when regulators investigate after a breach. For banks, this matters more than in most industries.

That’s the standard package. For a typical business, it works reasonably well. For a community bank, it has blind spots that deserve attention.

Blind Spots: Where Cyber Insurance Falls Short for Community Banks

Wire fraud and social engineering coverage is probably sublimited

Wire fraud and business email compromise (BEC) are among the costliest cyber threats facing banks. BEC alone accounts for roughly $3 billion in reported losses annually. Banks are in the business of moving money, and attackers know it.

Most cyber policies offer social engineering coverage as an endorsement, not a core coverage. Sublimits typically range from $100K to $250K. If a bank employee is tricked into wiring $500K to a fraudulent account, the cyber policy sublimit may cover half. The fidelity bond may or may not respond, depending on whether the loss qualifies under the bond language.

And it is getting worse. AI-generated voice and video can now impersonate executives in real time, and most policy language was written for email-based scams. For a deeper look at how deepfakes are breaking callback verification procedures and widening this gap, see When AI Clones Your CFO’s Voice

What to look for: Check whether your social engineering sublimit is adequate for your wire transfer volume. Check whether the policy defines "social engineering" broadly enough to include AI-generated voice and video. And if your policy requires a callback verification procedure, ask whether that procedure accounts for voice impersonation.

Your fidelity bond, D&O, and cyber policy may be pointing at each other

Banks carry fidelity bonds (covering employee dishonesty, forgery, computer fraud) alongside their cyber policies. These overlap in some areas and leave gaps in others.

Social engineering and fraudulent wire transfers are the most common gap. The fidelity bond may require “direct” fraud, someone physically stealing or forging. The cyber policy requires a “cyber event.” A BEC scam that tricks an employee into voluntarily initiating a legitimate wire transfer may not clearly fit either definition. The employee was not dishonest. There was no hack. Both carriers can argue it belongs to the other policy.

Directors and Officers (D&O) coverage adds another layer. If the Board is sued after a breach for inadequate oversight of cybersecurity, does the D&O policy respond? Some D&O policies now exclude claims “arising from” a cyber event, pushing everything to the cyber policy. But the cyber policy may not cover Board liability claims.

What to look for: Pull your cyber policy, fidelity bond, and D&O policy side by side. Check whether any of them have exclusions that push claims to one of the other policies. If you see phrases like "arising from a cyber event" in your D&O exclusions, or "computer fraud" carved out of your fidelity bond, those are the seams where coverage can fail.

Vendor outages may not be covered

Community banks depend on banking platforms, payment processors, and online banking providers. A breach or outage at any one of these vendors can bring operations to a halt.

Scenario: Your banking platform vendor suffers a ransomware attack. Your own systems are fine, but you cannot process transactions, access accounts, or serve customers for three days.

Many cyber policies either exclude third-party outages entirely, sublimit them, or require a “security failure” at the vendor. A configuration error, a failed update, or an operational failure at the vendor would not qualify. Your bank loses three days of operations, and your policy does not respond.

What to look for: Does your policy cover "dependent business interruption" or "contingent system failure"? Is there a sublimit? Does it require a "security event" at the vendor, or does it cover any "system outage"?

Ransomware coverage has 3 hidden traps

Financial institutions are among the most targeted industries for ransomware. Three things to check:

Trap 1: Sublimits.
Your declarations page says "$2M cyber." But ransomware/ extortion may be capped at $250K in the endorsements. Demand exceeds your sublimit? You pay the difference.
Trap 2: Security Warranties.
Cyber policies require MFA, patching, EDR, and backups as conditions of coverage. Miss one when a ransomware event hits, and the entire claim can be denied. MFA not enforced on remote access? Claim denied. Not because MFA would have stopped the attack. Because it was a contractual condition.
Trap 3: OFAC Sanctions Exclusion.
Most policies exclude ransom payments to OFAC-sanctioned groups. Banks deal with sanctions in daily compliance but many do not realize the same rules apply to their insurance. Pay a sanctioned group, and the carrier denies the claim. You may face OFAC penalties on top.

Regulatory coverage may be narrower than you think

Most cyber policies include regulatory proceedings coverage. But there are limits.

Fines and penalties are often excluded, or covered only where “insurable by law.” For banks, the 36-hour incident notification rule means regulators know quickly. The examination that follows can be extensive, and legal costs run into six figures.

The gap: your policy covers “regulatory proceedings” but may define it narrowly. An FDIC investigation framed as an examination rather than a formal enforcement action may not qualify.

Security Warranties: Where Cybersecurity Controls and Insurance Collide

Carriers require specific security controls as conditions of coverage: MFA on all remote access, EDR, patching within defined timelines, tested backups, email filtering, and employee security training. These are not recommendations. They are contractual requirements.

If any control is missing when a claim hits, coverage can be voided. A security gap is not just a vulnerability. It is an insurance gap.

If your bank works with an IT auditor or security firm, have them review your carrier’s warranty requirements alongside their assessment. For more on how examiner expectations and carrier requirements overlap, see What Your Examiner Expects From Your Cyber Insurance.

5 Things to Check Before Your Next Board Meeting

Thirty minutes. If you get through all five, you will know more about your cyber coverage than most community banks ever will.

  1. Find your sublimits. Check ransomware and social engineering sublimits against your aggregate. Below 25%? Flag it.

  2. Read your security warranties. List every control your policy requires. Verify your bank meets each one. One gap can void everything.

  3. Check your vendor coverage. Look for “dependent business interruption” language. If your policy only covers outages at your own bank, you have a gap.

  4. Look at your policies together. Pull cyber, fidelity bond, and D&O. Look for exclusions that push claims to another policy. “Arising from a cyber event” in your D&O? That is a gap.

  5. Ask about deepfake coverage. Does your social engineering coverage include AI-generated voice and video, or just written communications?

If any of these raises a question you cannot answer, bring it to your next broker conversation. Or if you would rather have someone who reads these for a living walk through it with you, get in touch. Learn more about how I work with community banks.