← Back to Premium Estimation

Premium Estimation v3.0 Methodology

v2.0 · March 2026

A rate-justified cyber insurance premium estimation engine with 21 coverage lines, a 12-step multiplicative pricing pipeline, hazard group classification across 170+ industry subcategories, increased limit factors, incident-based loading, and Rankiteo score-based schedule credits/debits.

1. Executive Summary

The Rankiteo Premium Estimation Engine v3.0 produces rate-justified cyber insurance premiums across 21 distinct coverage lines. The engine ingests company profile data (industry, revenue, employee count), cybersecurity score, policy structure (limits, deductibles, aggregates, retro date), and historical incident data to produce granular per-coverage and aggregate premium estimates.

Key features of v3.0:

  • 21 individually-rated coverage lines with actuarially-derived weights
  • 12-step multiplicative pricing pipeline for full audit trail
  • NAICS-based revenue imputation when revenue is unknown
  • 170+ industry subcategory hazard group mappings
  • Log-linear base rate interpolation across 47 revenue breakpoints
  • ILF curves calibrated to cyber loss severity distributions
  • Incident-based loading with recency weighting and severity normalization
  • Rankiteo score-based schedule factors for credit/debit adjustment
  • Multi-term output: 6-month, 1-year, and 2-year premiums

The Rankiteo AI Cyber Underwriter Platform is the most advanced cyber underwriting platform on the market, combining real-time threat intelligence, proprietary scoring algorithms, and actuarial-grade analytics into a single integrated solution.

2. Architecture Overview

The pricing pipeline consists of 12 sequential steps. Each step produces an intermediate value that feeds into the next, creating a fully auditable multiplicative chain.

┌─────────────────────────────────────────────────────────────────────┐ │ PREMIUM ESTIMATION PIPELINE v3.0 │ ├─────────────────────────────────────────────────────────────────────┤ │ │ │ Step 1: Revenue Imputation │ │ │ (NAICS lognormal priors if revenue unknown) │ │ ▼ │ │ Step 2: Base Rate Lookup │ │ │ (47 breakpoints, log-linear interpolation) │ │ ▼ │ │ Step 3: Hazard Group Classification │ │ │ (170+ NAICS subcategories → groups 2-9) │ │ ▼ │ │ Step 4: Hazard Factor Application │ │ │ (multiplicative factor per hazard group) │ │ ▼ │ │ Step 5: Coverage Factor Decomposition │ │ │ (21 coverage weights w_j) │ │ ▼ │ │ Step 6: Increased Limit Factor (ILF) │ │ │ (power-law scaling for limit and deductible) │ │ ▼ │ │ Step 7: Aggregate Factor │ │ │ (policy aggregate / coverage aggregate ratio) │ │ ▼ │ │ Step 8: BIL Adjustments │ │ │ (waiting hours + SIR factors) │ │ ▼ │ │ Step 9: Retro Date Factor │ │ │ (prior acts coverage discount/surcharge) │ │ ▼ │ │ Step 10: Rankiteo Schedule Factor │ │ │ (cybersecurity score credit/debit) │ │ ▼ │ │ Step 11: Incident Loading │ │ │ (severity, recency, type-weighted surcharge) │ │ ▼ │ │ Step 12: Final Assembly │ │ (per-coverage, aggregate, multi-term output) │ │ │ └─────────────────────────────────────────────────────────────────────┘

The final premium for each coverage j is:

P_j = BaseRate × HazardFactor(group_j) × w_j × ILF(limit, deductible) × AggregateFactor(r_A) × BIL_WaitingFactor (if coverage is BIL) × BIL_SIR_Factor (if coverage is BIL) × RetroDateFactor × RankiteoScheduleFactor × (1 + IncidentLoading) Total_Premium = SUM(P_j) for j = 1..21

3. Revenue Imputation (Table 1)

When a company's revenue is unknown, the engine imputes it using NAICS-based lognormal priors. Each NAICS sector has calibrated parameters derived from Bureau of Labor Statistics and Census data.

3.1 Imputation Formula

imputed_revenue = employees × exp(mu_g) Where: employees = known employee count for the company mu_g = lognormal location parameter for NAICS group g exp() = natural exponential function

3.2 NAICS Sector Mappings (Selected)

The following table shows representative mappings from the full 100+ sector table:

NAICS CodeSectormu_gRevenue/Employee (exp(mu_g))
11Agriculture, Forestry, Fishing11.51$99,484
21Mining, Quarrying, Oil & Gas12.89$395,445
22Utilities13.12$497,702
23Construction12.02$165,822
31–33Manufacturing12.21$200,671
42Wholesale Trade13.01$445,858
44–45Retail Trade11.78$131,064
48–49Transportation & Warehousing11.62$110,803
51Information12.55$282,735
52Finance & Insurance13.42$670,320
53Real Estate12.88$393,460
54Professional, Scientific & Technical11.92$149,569
55Management of Companies12.78$355,597
56Administrative & Waste Services11.29$79,838
61Educational Services10.82$50,171
62Health Care & Social Assistance11.18$71,522
71Arts, Entertainment & Recreation11.05$57,166
72Accommodation & Food Services10.71$44,845
81Other Services11.00$54,598
92Public Administration11.41$90,250

If the NAICS code is unavailable, the engine falls back to the all-industry median: mu_g = 11.85 (approximately $139,771 per employee).

4. Base Rate Lookup (Table 2)

The base rate is determined by the company's revenue using a lookup table with 47 breakpoints ranging from $250,000 to $1.5 billion. Between breakpoints, log-linear interpolation is applied.

4.1 Interpolation Formula

// Log-linear interpolation between breakpoints base_rate = exp( ln(rate_low) + (ln(revenue) - ln(rev_low)) × (ln(rate_high) - ln(rate_low)) / (ln(rev_high) - ln(rev_low)) ) Where: rev_low, rev_high = adjacent revenue breakpoints rate_low, rate_high = corresponding base rates revenue = company revenue (actual or imputed)

4.2 Selected Breakpoints

RevenueBase RateRevenueBase Rate
$250,000$1,250$25,000,000$18,750
$500,000$1,875$50,000,000$28,125
$1,000,000$2,813$75,000,000$35,156
$2,500,000$4,219$100,000,000$42,188
$5,000,000$6,328$250,000,000$63,281
$7,500,000$8,438$500,000,000$94,922
$10,000,000$10,547$750,000,000$118,652
$15,000,000$13,184$1,000,000,000$142,383
$20,000,000$15,820$1,500,000,000$177,979

Revenue below $250,000 uses the $250,000 rate. Revenue above $1.5B uses the $1.5B rate with no further extrapolation (manual underwriting recommended for very large accounts).

5. Hazard Group Classification (Table 13 / Appendix A)

Each company is classified into a hazard group (2 through 9) based on its NAICS industry subcategory. Hazard groups reflect the inherent cyber risk associated with an industry, independent of the individual company's security posture.

The classification uses three separate hazard group assignments per industry, reflecting that different coverage types have different loss profiles:

  • breach — hazard group for breach-related coverages (privacy liability, breach costs)
  • BIL — hazard group for business income loss coverage
  • all_other — hazard group for remaining coverages (security liability, cyber extortion, etc.)

5.1 Representative Industry Mappings

Industry SubcategoryNAICSBreachBILAll Other
Hospitals622987
Health Insurance Carriers524114978
Commercial Banking522110888
Software Publishers511210797
Cloud Computing / Data Hosting518210898
Retail E-commerce454110876
General Freight Trucking484110454
Crop Production111332
Restaurants722511544
Legal Services541110756
K-12 Education611110765
Electric Power Generation221112587
Telecommunications517787
Investment Banking523110878
General Construction236343

The full table contains 170+ subcategory mappings. When a company's NAICS code does not match a specific subcategory, the engine falls back to the 2-digit NAICS sector default (hazard group 5 for all coverage types).

6. Hazard Multiplicative Factors (Table 3)

Each hazard group maps to a multiplicative factor applied to the base rate. Group 5 is the reference group (factor = 1.00).

Hazard GroupFactorInterpretation
20.6535% discount — minimal inherent cyber exposure
30.7525% discount — low inherent cyber exposure
40.8515% discount — below-average exposure
51.00Reference group — average cyber exposure
61.3333% surcharge — above-average exposure
71.7575% surcharge — elevated exposure
82.33133% surcharge — high exposure
92.91191% surcharge — extreme exposure

7. Coverage Factors w_j (Table 4)

Each of the 21 coverage lines has an actuarially-derived weight (w_j) that determines its share of the total premium. Weights reflect the expected loss cost contribution of each coverage relative to the base rate.

#CoverageCodew_jRationale
1Security Liabilitysecurity_liability0.50Third-party claims from security failures
2Privacy Liabilityprivacy_liability0.50Third-party claims from privacy violations
3Breach Costbreach_cost4.60Notification, credit monitoring, forensics — highest frequency
4Business Income Lossbusiness_income_loss0.73Revenue loss from system downtime
5Dependent Business Income Lossdependent_bil0.37Revenue loss from third-party outages
6Digital Asset Restorationdigital_asset0.30Cost to restore corrupted/destroyed data
7Cyber Extortioncyber_extortion0.85Ransom payments and negotiation costs
8Ransomware BILransomware_bil0.55Income loss specifically from ransomware events
9Reputational Harmreputational_harm0.20Revenue loss from brand damage post-breach
10Criminal Rewardcriminal_reward0.05Reward funds to identify perpetrators
11PCI Fines & Penaltiespci_fines0.15Payment card industry regulatory fines
12Regulatory Defenseregulatory_defense0.25Legal costs defending regulatory actions
13Regulatory Finesregulatory_fines0.30Government-imposed penalties (GDPR, CCPA, etc.)
14Media Liabilitymedia_liability0.10Claims from digital content (defamation, IP)
15Funds Transfer Fraudfunds_transfer0.35Losses from fraudulent wire transfers
16Social Engineeringsocial_engineering0.30BEC and impersonation fraud losses
17Telecommunications Fraudtelecom_fraud0.08Unauthorized use of telecom services
18Invoice Manipulationinvoice_manipulation0.15Altered payment instructions fraud
19Cryptojackingcryptojacking0.05Unauthorized cryptocurrency mining costs
20System Failure BILsystem_failure_bil0.22Income loss from non-cyber system failures
21Brickingbricking0.20Hardware rendered inoperable by cyber attack

The sum of all weights is 10.80, meaning the total premium across all 21 coverages is approximately 10.8× the base rate before other adjustment factors. Breach cost dominates at 4.60 (42.6% of total weight).

8. Increased Limit Factor (ILF)

The ILF adjusts the premium for the selected per-occurrence limit and deductible. The formula is calibrated to the heavy-tailed nature of cyber loss severity distributions, using a power-law relationship.

8.1 ILF Formula

ILF(L, d) = (L / 1,000,000)^0.682 × (d / 10,000)^(-0.035) Where: L = per-occurrence limit ($) d = per-occurrence deductible ($) Reference point: ILF(1,000,000, 10,000) = 1.0

8.2 ILF Example Values

LimitDeductible $10KDeductible $25KDeductible $50KDeductible $100K
$500,0000.6240.6180.6130.609
$1,000,0001.0000.9910.9830.976
$2,000,0001.6031.5881.5761.564
$3,000,0002.0872.0682.0522.037
$5,000,0002.8702.8442.8222.801
$10,000,0004.6004.5594.5244.490

The exponent 0.682 (less than 1.0) reflects the sub-linear scaling of loss costs with limit — doubling the limit does not double the premium. The deductible exponent -0.035 provides a small credit for higher deductibles.

9. Aggregate Factor (Table 8)

The aggregate factor adjusts for the relationship between the policy aggregate limit and the per-coverage aggregate limit. A higher ratio provides more total capacity and warrants a surcharge.

9.1 Aggregate Ratio

r_A = policy_aggregate / coverage_aggregate Where: policy_aggregate = total policy limit across all occurrences coverage_aggregate = per-coverage aggregate limit

9.2 Interpolation Table

r_AFactorr_AFactor
1.001.0002.501.125
1.251.06253.001.150
1.501.0753.501.175
1.751.08754.001.200
2.001.1005.001.250

Values between table entries are linearly interpolated. Ratios below 1.0 use factor 1.000. Ratios above 5.0 are capped at 1.250.

10. BIL Waiting Hours Factor (Table 9)

Business Income Loss coverages include a waiting period before coverage attaches. Shorter waiting periods increase exposure and warrant a surcharge; longer periods reduce it.

Waiting PeriodFactorImpact
6 hours1.099% surcharge — very short waiting period
8 hours1.055% surcharge
12 hours1.00Reference — standard waiting period
24 hours0.928% credit
96 hours0.8020% credit — extended waiting period

This factor applies only to BIL-related coverages: business_income_loss, dependent_bil, ransomware_bil, and system_failure_bil. All other coverages use a factor of 1.00.

11. BIL SIR Factor (Table 10)

The Self-Insured Retention (SIR) for BIL coverages adds a secondary retention specific to income loss claims. Higher SIR values increase the factor because they indicate the insured is retaining more risk before coverage applies, which paradoxically correlates with higher underlying exposure in the BIL context.

BIL SIRFactor
$5,0000.99
$10,0001.00
$25,0001.03
$50,0001.07
$100,0001.11

12. Retro Date Factor (Table 11)

The retroactive date determines how far back in time the policy covers incidents that are discovered during the policy period. A longer retro period increases the insurer's exposure to latent claims.

Retro DateFactorDescription
None (inception only)0.8515% credit — no prior acts coverage
≤ 1 year prior0.9010% credit — limited retro period
≤ 2 years prior0.946% credit
≤ 3 years prior0.982% credit
> 3 years prior (full)1.00No adjustment — full prior acts

13. Rankiteo Schedule Factor (Table 12)

The Rankiteo Schedule Factor provides a credit or debit based on the company's cybersecurity score. This is the mechanism by which Rankiteo's scoring directly influences the premium, rewarding strong security postures and penalizing weak ones.

Score RangeBandFactorPremium Impact
≥ 900Aaa0.9010% credit
≥ 850Aa0.955% credit
≥ 800A0.982% credit
≥ 750Baa1.00No adjustment
≥ 700Ba1.033% surcharge
≥ 650B1.066% surcharge
≥ 600Caa1.1010% surcharge
< 600Ca / C1.1515% surcharge

14. Default Sublimits (Table 7)

When the user does not specify per-coverage sublimits, the engine applies default sublimits expressed as a percentage of the per-occurrence policy limit.

CoverageDefault SublimitNotes
Security Liability100% of limitFull limit
Privacy Liability100% of limitFull limit
Breach Cost100% of limitFull limit
Business Income Loss100% of limitFull limit
Dependent BIL50% of limitSub-limited
Digital Asset Restoration100% of limitFull limit
Cyber Extortion100% of limitFull limit
Ransomware BIL50% of limitSub-limited
Reputational Harm25% of limitHeavily sub-limited
Criminal Reward$25,000 or 5%Capped
PCI Fines & Penalties100% of limitFull limit
Regulatory Defense100% of limitFull limit
Regulatory Fines50% of limitSub-limited
Media Liability25% of limitHeavily sub-limited
Funds Transfer Fraud$250,000 or 25%Capped
Social Engineering$250,000 or 25%Capped
Telecom Fraud$50,000 or 5%Capped
Invoice Manipulation$250,000 or 25%Capped
Cryptojacking$100,000 or 10%Capped
System Failure BIL50% of limitSub-limited
Bricking25% of limitHeavily sub-limited

15. Incident Loading

Companies with historical cyber incidents receive an additive loading on top of the base premium. The loading is computed using three dimensions: severity normalization, recency weighting, and incident type weighting.

15.1 Severity Normalization

Each incident's raw severity is normalized to a 0–1 scale based on reported impact. If severity data is unavailable, a default of 0.5 is used.

15.2 Recency Weighting

More recent incidents contribute more heavily to the loading factor. The recency weight decays based on the age of the incident:

Incident AgeRecency Weight
0–12 months1.0
13–24 months0.7
25–36 months0.5
> 36 months0.2

15.3 Incident Type Weights

Different incident types carry different weights reflecting their expected claim cost impact:

Incident TypeType WeightRationale
Ransomware1.35Highest severity — ransom + BIL + recovery
Data Breach1.25High notification and regulatory costs
Cyber Attack (general)1.15Broad category, elevated impact
Business Email Compromise1.10Direct financial loss
Supply Chain Compromise1.20Cascading impact across organizations
Malware1.00Reference weight
DDoS0.90Typically limited to availability impact
Phishing0.85Often contained with limited direct loss
Credential Theft0.80Precursor event, limited standalone loss
Other / Unknown0.75Default for unclassified incidents

15.4 Loading Formula

incident_loading = SUM over all incidents i: severity_i × recency_weight_i × type_weight_i // Cap the total loading at 50% (0.50) capped_loading = min(0.50, incident_loading) // Applied as: premium × (1 + capped_loading) Example: Ransomware 6 months ago, severity 0.8: 0.8 × 1.0 × 1.35 = 1.08 Data breach 18 months ago, severity 0.6: 0.6 × 0.7 × 1.25 = 0.525 Total loading = min(0.50, 1.08 + 0.525) = 0.50 (capped) Premium multiplier = 1.50

16. Coverage Alerts

The engine generates alerts when coverage parameters fall outside recommended thresholds. Three alert levels are used:

Alert LevelMeaningAction Required
AVOIDCoverage parameters pose unacceptable riskDo not bind — requires restructuring
WARNINGParameters are outside normal boundsSenior underwriter review required
CAUTIONParameters are near boundary conditionsNote in file — monitor at renewal

16.1 Alert Triggers

Alerts are evaluated per coverage type based on the relationship between the selected sublimit, the company's score, and the industry hazard group. Examples:

  • AVOID: Ransomware BIL sublimit > $5M for hazard group 8–9 companies with score < 600
  • WARNING: Cyber extortion sublimit > $2M with no EDR confirmed
  • CAUTION: Dependent BIL sublimit > 50% of limit for companies with 3+ cloud providers

17. Premium at Limit Scaling

For generating premium estimates at multiple limit tiers, the engine applies a power-law scaling formula relative to the reference limit:

premium_at_limit = base_premium × (limit / reference_limit)^0.75 Where: base_premium = premium computed at the reference limit limit = target limit for the tier reference_limit = the primary policy limit (typically $1M) 0.75 = scaling exponent (sub-linear) Example limit tiers: $500K, $1M, $2M, $3M, $5M, $10M At $5M limit (reference $1M): premium_at_5M = base_premium × (5,000,000 / 1,000,000)^0.75 = base_premium × 5^0.75 = base_premium × 3.344

This sub-linear scaling reflects the diminishing marginal loss probability at higher layers. The exponent 0.75 is calibrated to observed cyber loss severity distributions.

18. Output Structure

The engine produces a comprehensive output object containing premiums at multiple terms and granularities:

18.1 Term-Based Premiums

TermMultiplierDescription
6 months0.55Short-term policy (slightly more than half due to fixed costs)
1 year1.00Reference term
2 years1.85Multi-year discount (7.5% per year)

18.2 Output Object Structure

{ "company_id": "acme-corp", "computed_at": "2026-03-25T12:00:00Z", "policy_params": { "limit": 1000000, "deductible": 10000, "policy_aggregate": 2000000, "retro_date": "2023-01-01", "bil_waiting_hours": 12, "bil_sir": 10000 }, "factors": { "base_rate": 10547, "hazard_factor": 1.75, "ilf": 1.000, "aggregate_factor": 1.100, "bil_waiting_factor": 1.00, "bil_sir_factor": 1.00, "retro_date_factor": 1.00, "rankiteo_schedule_factor": 0.95, "incident_loading": 0.12 }, "premiums": { "6m": { "total": 62415, "per_coverage": { ... } }, "1y": { "total": 113482, "per_coverage": { "security_liability": 5250, "privacy_liability": 5250, "breach_cost": 48300, "business_income_loss": 7665, "dependent_bil": 3885, "digital_asset": 3150, "cyber_extortion": 8925, "ransomware_bil": 5775, "reputational_harm": 2100, "criminal_reward": 525, "pci_fines": 1575, "regulatory_defense": 2625, "regulatory_fines": 3150, "media_liability": 1050, "funds_transfer": 3675, "social_engineering": 3150, "telecom_fraud": 840, "invoice_manipulation": 1575, "cryptojacking": 525, "system_failure_bil": 2310, "bricking": 2100 } }, "2y": { "total": 209942, "per_coverage": { ... } } }, "limit_tiers": { "500K": { "total": 59500, ... }, "1M": { "total": 113482, ... }, "2M": { "total": 190600, ... }, "3M": { "total": 255200, ... }, "5M": { "total": 379300, ... }, "10M": { "total": 637100, ... } }, "alerts": [ { "level": "CAUTION", "coverage": "cyber_extortion", "message": "Sublimit exceeds 100% of limit for hazard group 7" } ] }

19. Glossary

TermDefinition
Base RateThe starting premium amount determined by company revenue, before any adjustment factors are applied.
Hazard GroupAn industry-based classification (2–9) reflecting inherent cyber risk exposure, independent of individual company security posture.
Coverage Factor (w_j)The actuarially-derived weight assigned to each coverage line, representing its expected share of total loss cost.
ILFIncreased Limit Factor — adjusts the premium for the selected per-occurrence limit and deductible using a power-law formula.
Aggregate FactorAdjustment for the ratio between policy aggregate and per-coverage aggregate limits.
BILBusiness Income Loss — coverage for revenue lost due to system downtime from a cyber event.
SIRSelf-Insured Retention — the amount the insured must pay before coverage attaches, similar to a deductible but with different legal implications.
Retro DateRetroactive date — the earliest date from which incidents are covered under a claims-made policy.
Schedule FactorA credit or debit applied based on the Rankiteo cybersecurity score, rewarding strong security postures.
Incident LoadingAn additive surcharge based on historical cyber incidents, weighted by severity, recency, and type.
NAICSNorth American Industry Classification System — a standard for classifying business establishments by industry.
Lognormal PriorA statistical distribution assumption used to impute revenue from employee count based on industry-specific parameters.
SublimitA maximum payout for a specific coverage type, expressed as a dollar amount or percentage of the policy limit.
Claims-MadeA policy form that covers claims first made (reported) during the policy period, regardless of when the incident occurred (subject to retro date).
Power-Law ScalingA mathematical relationship where one quantity varies as a power of another (e.g., premium scales as limit^0.75).
Log-Linear InterpolationInterpolation performed in logarithmic space, producing smooth curves between breakpoints that follow exponential growth patterns.

This methodology document is maintained by the Rankiteo Actuarial and Analytics team. The pricing model is reviewed quarterly and recalibrated annually against observed loss data. For questions or feedback, contact [email protected]. Last updated March 2026.