From analyzing broker index data across five consecutive renewal cycles, the 32% cyber non-proportional decline stands out as the single largest rate movement in the line's history. When Gallagher Re published its April 2026 renewal report, the headline number confirmed what cedants and brokers had seen building since January: the cyber reinsurance market has moved from competitive to aggressively soft in under twelve months.

The numbers demand context. Non-proportional cyber reinsurance rates, as measured by Gallagher Re's Cyber Aggregate Excess of Loss Risk-Adjusted Rating (RAR) index, fell 32% on a risk-adjusted basis at the April 1, 2026 renewal. This follows a decline of up to 25% at the January 1 renewal, which Guy Carpenter separately confirmed with its own data showing excess-of-loss and hard retrocession structures gaining ground against traditional quota share placements. Primary cyber insurance rates, meanwhile, remain flat to slightly negative for most US carriers. The gap between primary and reinsurance rate movements is the story within the story.

S&P Global Ratings projects global cyber insurance premiums will reach approximately $23 billion in 2026, driven by 15% to 20% annual growth. But the trajectory of that growth is now colliding with a reinsurance market where capacity far exceeds demand, and the resulting rate compression raises a fundamental actuarial question: at what price point does the cyber reinsurance market begin selecting against itself?

The April 1 Renewal Data: Unpacking the 32% Decline

Gallagher Re's RAR index is the closest thing the cyber reinsurance market has to a standardized benchmark. It tracks risk-adjusted rate movements for US non-proportional cyber covers, adjusting for changes in exposure, attachment points, and portfolio composition. The April 2026 reading of negative 32% is not simply a rate cut; it reflects a market where reinsurers are simultaneously reducing price, lowering attachment points, and broadening coverage definitions to win placements.

Several structural factors drove the April decline:

  • Surplus capacity. Reinsurance capital reached $785 billion by early 2026, with industry surplus surpassing $1 trillion. New cyber MGAs, Lloyd's syndicates, and dedicated insurer teams have launched into the line, creating an oversupply dynamic that one Gallagher Re analyst described as "more-than-adequate capacity" at the January 1 renewal, with conditions continuing to soften through April.
  • Stable loss experience. Average cyber loss ratios remained between 40% and 50% through 2024, with the overall US cyber combined ratio at approximately 73% for 2023. Beazley, one of the largest specialty cyber carriers, reported a 48.5% loss ratio through the first half of 2025. These figures gave reinsurers confidence to deploy capital aggressively, compressing margins further.
  • Attachment point reductions. Cedants secured lower attachment points during the renewal, meaning reinsurance now attaches at a lower loss threshold. For the reinsurer, this is a meaningful risk expansion that the 32% rate decline alone does not capture. The effective risk-adjusted price per unit of coverage has fallen even more steeply than the headline figure suggests.
  • Pro rata commission increases. Quota share treaties renewed with ceding commissions approximately 1% higher than prior year, reflecting reinsurers' willingness to pay more for access to what remains a profitable book of business.

Average market cession rates stood at 39% through the Q1 renewals, down from 40% in 2025. That the cession rate barely moved despite sharply lower reinsurance pricing suggests that cedants are not yet materially cutting their reinsurance spend. They are getting more protection for less money, which is the textbook buyer's market dynamic.

Primary vs. Reinsurance: Two Markets Moving at Different Speeds

The disconnect between primary and reinsurance rate movements deserves close attention. Primary cyber insurance rates for most US carriers are flat to slightly negative, with some large-corporate accounts seeing modest rate decreases. This is a far cry from the 32% reinsurance decline. The divergence matters because it determines where margin compression hits hardest.

For carriers writing cyber on a net basis (retaining risk after reinsurance), the primary rate flatness combined with cheaper reinsurance actually improves ceded economics. A carrier that renews its excess-of-loss program at 32% less while maintaining primary rates has effectively widened its net margin on the ceded portion of the book. This is a temporary gift from the reinsurance cycle, not a structural improvement in the underlying risk profile.

For reinsurers, the math is less forgiving. A 32% rate decline on a line where loss ratios already average 40% to 50% leaves a thin margin for adverse development. If the 2024 loss ratio of 49% proves to be the floor rather than the ceiling, the current reinsurance pricing will be inadequate within two accident years.

WTW's February 2026 cyber outlook noted that "a material shift to a hard market is not yet observable," while simultaneously cautioning that the market trajectory will be shaped by "severe ransomware incidents and systemic events occurring in early 2026." The implication is clear: the market is pricing for continuation of recent benign experience, with limited margin for deterioration.

Bespoke Solutions Replace Standard Treaty Programs

One of the most significant structural shifts at the April renewal was the proliferation of bespoke cyber reinsurance structures. As capacity floods the market, reinsurers are competing not just on price but on structural innovation. Tailored excess-of-loss structures are replacing standard treaty programs, with specific event, risk, and hybrid designs gaining ground over traditional quota share and aggregate protections.

This trend has several actuarial implications. First, bespoke structures are harder to benchmark. When every placement has unique attachment points, event definitions, and aggregation limits, the RAR index becomes less representative of individual portfolio economics. Second, structural innovation in a soft market tends to favor the buyer: cedants can negotiate broader definitions of covered cyber events, lower attachment points, and more favorable reinstatement terms.

Third, and most consequential for reserving, bespoke structures create basis risk in the opposite direction from what the market experienced during the 2020-2022 hard market. During the hard market, restrictive coverage terms meant that some cyber losses fell outside reinsurance recovery. In the current environment, broader terms mean that reinsurers may be exposed to losses that the original treaty wording would have excluded. The pattern parallels what happened in the property-cat market during the mid-2010s soft cycle, when broadened terms and conditions contributed to higher-than-expected recovery ratios when losses eventually materialized.

Gallagher Re's report highlighted the "surge" in tailored portfolio offerings driven by abundant capacity and stable performance. The risk is that these offerings are optimized for a benign loss environment and have not been stress-tested against a systemic cyber event.

Reserve Adequacy Under Rate Compression

The central actuarial question is whether current reserve levels reflect the rate environment now in force. Cyber insurance is a short-tail line by P&C standards, with most claims reported and settled within 12 to 24 months. But this apparent simplicity masks several complications that make reserve adequacy assessment genuinely difficult.

First, the line's loss history is short. Cyber insurance only became a significant standalone product around 2015, and the market went through a hard cycle in 2020-2022 that distorted the loss development patterns. Reserving actuaries working with 8 to 10 years of data, much of it from a hardening market, face the classic credibility problem: the data reflects conditions that no longer exist.

Second, the combined ratio profile has been remarkably favorable. S&P Global data shows average combined ratios around 70% and approximately $9 billion in cumulative underwriting profit across 2022-2024. This profitability has attracted the capital that is now driving rates down, creating a reflexive dynamic where past profits underwrite future rate inadequacy.

Third, frequency and severity trends are diverging. Ransomware payment rates declined to 28-32% of incidents in 2025, down from 37% in 2024, as organizations improved their security postures and backup capabilities. This frequency improvement has masked underlying severity increases: when ransoms are paid, the amounts are higher, and business interruption durations are longer. A reserving framework that weights frequency trends more heavily than severity trends will understate ultimate losses if the severity trend reasserts.

From tracking reserve adequacy across multiple P&C lines during the current soft market, the cyber line shares a characteristic with commercial auto and general liability during past cycles: profitability is highest just before the turn. The 73% combined ratio and 40-50% loss ratio figures are backward-looking metrics that reflect the pricing of 2022-2024 vintage business. The 2026 vintage, priced with 32% lower reinsurance rates and flat primary rates, will produce a different combined ratio. The question is how different.

The SME Penetration Question

One factor that could sustain premium volume despite rate declines is the expansion of cyber insurance into the small and medium enterprise segment. Current penetration rates reveal a massive coverage gap:

Segment Revenue Range Estimated Penetration
Large corporations $1B+ revenue 60-70%
Mid-market $100M-$1B revenue 40-50%
SMEs $10M-$100M revenue 10-20%
Micro businesses Below $10M revenue 5-10%

Munich Re and CRC Group have both identified SME penetration as the primary growth vector for the cyber market. If take-up rates among SMEs rise from the current 10-20% toward the 40-50% range seen in mid-market accounts, the resulting premium volume could offset rate declines and expand the aggregate risk pool.

But SME expansion carries its own actuarial risks. Smaller businesses typically have weaker cybersecurity controls, less incident response capability, and higher proportional business interruption exposure. The loss experience from large-corporate cyber portfolios, where sophisticated security operations centers and dedicated incident response teams reduce both frequency and severity, may not translate to the SME segment. Underwriters pricing SME cyber at rates benchmarked against large-corporate experience are likely underpricing the risk.

The American Academy of Actuaries addressed this dynamic in its January 2026 Contingencies article, noting that the cyber insurance market's challenge "is less one of actuarial sophistication and more one of carrier expansion, public understanding, and regulatory dynamics." The Academy's Cyber Risk Task Force has emphasized that loss ratio stability at 40-50% average masks significant variation by segment, with SME portfolios showing higher frequency and less predictable severity.

Geopolitical Wild Card: The Iran Conflict and Systemic Cyber Risk

The April 2026 renewal took place against the backdrop of Operation Epic Fury, the US-Israel military operation against Iran that began on February 28, 2026. By late March, Palo Alto Networks' Unit 42 identified a new threat cluster (CL-STA-1128/Cyber Av3ngers) targeting operational technology and industrial control systems, with Rockwell Automation equipment as a primary target. Approximately 60 individual hacktivist groups were active in cyber operations connected to the conflict.

For cyber insurers and reinsurers, the Iran conflict creates two distinct risk channels. The first is direct: state-sponsored or state-affiliated cyber attacks against US critical infrastructure, financial institutions, and healthcare systems. CyberCube's analysis identified high-risk concentrations of vulnerable companies in the financials and healthcare sectors, where outages cause significant operational friction. The second channel is indirect: because cyber risk is highly interconnected through shared cloud providers and supply chains, a major event targeting one sector can cascade across portfolios.

The market has not priced this risk. The 32% rate decline at April 1 occurred after the Iran conflict was already underway, suggesting that reinsurers are either discounting the probability of a systemic cyber event or relying on war exclusion clauses to limit their exposure. Both assumptions carry risk. Attribution of state-sponsored cyber attacks is notoriously difficult, and proxy attacks by affiliated hacktivist groups may fall in the gray zone between criminal activity (covered) and acts of war (excluded). S&P Global warned in April 2026 that the Middle East conflict is testing cyber war exclusions in real time.

The Stryker wiperware incident has already raised concerns about how US contract war exclusions would apply in practice. If a systemic cyber event occurs and coverage disputes arise over war exclusion applicability, the resulting litigation and regulatory attention could reshape the line's risk profile overnight.

What Late-2026 Stabilization Would Require

Gallagher Re and several broker reports project that cyber reinsurance rates could stabilize or begin firming in late 2026. For this to happen, several conditions would need to align:

  • A meaningful cyber loss event. The market is currently pricing off several years of benign loss experience. A single systemic event, such as a major cloud provider outage, a supply chain compromise affecting thousands of organizations, or a state-sponsored attack on critical infrastructure, would rapidly reprice the line. The insurance industry's experience with the NotPetya event in 2017 ($10 billion in total losses, with $3 billion in insured cyber claims) remains the benchmark for what a market-turning event looks like.
  • SME volume growth that changes the risk profile. As more SME business enters the market, aggregate deployed limits will grow, expanding reinsurers' potential loss exposure. If SME loss experience proves worse than large-corporate benchmarks, the combined ratio will deteriorate and capital will begin retreating.
  • Reinsurer capital reallocation. Several new entrants have launched cyber-focused MGAs and Lloyd's syndicates in 2025-2026, attracted by the line's historical profitability. If returns compress below their cost of capital, some of this capacity will redeploy to other lines, tightening supply. CRC Group's 2026 market report noted that this new capacity has "intensified competition" but also creates the conditions for rapid withdrawal if profitability deteriorates.
  • Geopolitical escalation. The Iran conflict's cyber dimension has been contained relative to initial fears, but any escalation targeting US civilian infrastructure would immediately shift the reinsurance pricing calculus.

The most likely path is a gradual stabilization driven by the combination of these factors, rather than a single catalyzing event. Lead insurers in the large-corporate and SME segments are already signaling that the floor may be near, with Gallagher Re noting that "rates [are] expected to stabilise and potentially increase in late 2026."

Why This Matters for Actuaries

The 32% cyber non-proportional rate decline has direct implications across several actuarial functions:

Pricing actuaries face a calibration challenge. Rate adequacy models built on 2022-2024 loss data may not reflect the current risk environment, where broader coverage terms, lower attachment points, and potential adverse selection from SME expansion all push expected losses upward. Trend assumptions that extrapolate from a period of improving frequency may overweight a transient dynamic.

Reserving actuaries need to evaluate whether current IBNR provisions account for the rate environment shift. Cyber's short tail means that reserve inadequacy surfaces quickly, typically within 12 to 18 months, but the current soft market may extend development periods as cedants and reinsurers negotiate coverage disputes on novel bespoke structures.

Capital management actuaries should model the interaction between cyber reinsurance rate declines and portfolio concentration risk. The 39% cession rate means that primary carriers are retaining 61% of cyber risk on a net basis. If the cession rate drops further as carriers take advantage of their improved loss experience to retain more risk, the net portfolio's sensitivity to a systemic event increases.

ERM actuaries face the challenge of quantifying a geopolitical cyber risk that the market is not pricing. The Iran conflict introduces a tail risk that traditional frequency-severity models do not capture. Scenario testing using CyberCube or similar platforms, calibrated to the current threat landscape, should be a priority for any company with meaningful cyber exposure.

The cyber reinsurance market in May 2026 sits at a familiar point in the insurance cycle: rates are falling faster than loss experience justifies, capacity is abundant, and the market's collective memory of the last hard cycle is fading. The 32% April 1 decline is a data point, but it is also a signal. The question for every actuary working in this space is whether the next data point will confirm the trend or break it.

Further Reading on actuary.info

Sources

  1. Reinsurance News: US Cyber Rates Drop 32% at April 1, Bespoke Solutions Surge (Gallagher Re)
  2. Insurance Business: Historic Softening in Cyber Reinsurance Pricing (Gallagher Re)
  3. S&P Global Ratings: Cyber Insurance Market Outlook 2026
  4. Insurance Journal: Reinsurance Rates Continued Softening During April Renewals (May 2026)
  5. WTW: Cyber Risk, A Look Ahead to 2026
  6. CRC Group: 2026 Cyber + Technology State of the Market
  7. American Academy of Actuaries: Cyber Insurance Nears an Inflection Point (Contingencies, January 2026)
  8. Gallagher Re: Cyber Risk Adjusted Rating (RAR) Index 2026 Update
  9. Munich Re: Cyber Insurance Risks and Trends 2026
  10. CyberCube: How Cyber (Re)Insurers Should React as the Iran War Unfolds
  11. Munich Re: Closing the Cyber Protection Gap for SMEs