IAMRoadmapIAMRoadmap
INDUSTRY TRENDS

IAM News: Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity posture when a

2 min readFebruary 25, 2026IAM Roadmap Team

Key Insight

With one in three cyber-attacks now involving compromised employee accounts, insurers and regulators are placing far greater emphasis on identity post...

📰 Source: The Hacker News

Summary

Cyber insurers and regulators are increasingly focusing on an organization's identity posture when assessing cyber risk, driven by the rising number of attacks involving compromised employee accounts. This shift highlights the importance of understanding and improving an organization's identity and access management (IAM) practices. However, many organizations struggle to provide transparent and accurate assessments of their IAM posture.

Attack Flow

Social Engineering

Compromises

Exploits

Data Exfiltration

🎯 Attacker

📱 Phishing Email

🔓 Employee Account

💾 Target System

📁 Stolen Data

IAM Impact

The rise of identity cyber scores highlights the critical need for organizations to prioritize IAM practices, including password hygiene, privileged access management, and multi-factor authentication (MFA) coverage. IAM professionals must work closely with stakeholders to ensure that IAM practices are aligned with business objectives and that identity posture is accurately assessed and reported.

Key Takeaways

  • Improved Visibility: IAM professionals must provide transparent and accurate assessments of an organization's IAM posture to meet the demands of cyber insurers and regulators.
  • Prioritized Practices: Organizations must prioritize IAM practices, including password hygiene, privileged access management, and MFA coverage, to reduce the risk of identity-based attacks.
  • Stakeholder Alignment: IAM professionals must work closely with stakeholders to ensure that IAM practices are aligned with business objectives and that identity posture is accurately assessed and reported.

Recommendations

  • Conduct Regular IAM Audits: Organizations should conduct regular IAM audits to identify vulnerabilities and areas for improvement.
  • Implement MFA: Organizations should implement MFA coverage for all users and applications to reduce the risk of identity-based attacks.
  • Develop an IAM Strategy: Organizations should develop a comprehensive IAM strategy that aligns with business objectives and priorities.
Trend Topics
IAM newssecurity newsThe Hacker News
All Articles