The Pattern: How Insurers Became the Fastest Security Regulator
Governments take years to pass cybersecurity legislation. Industry standards bodies take longer. But cyber insurers moved the entire market in 18 months. The pattern is worth studying because it's about to repeat.
In early 2022, multi-factor authentication was a "best practice." Organizations could buy comprehensive cyber liability coverage without it. Underwriters asked about MFA on applications, but a "no" answer didn't kill the deal — it just adjusted the premium. By mid-2023, the landscape had shifted decisively. Coalitionp, Travelers, Chubb, and AIG all began requiring MFA on privileged accounts as a minimum condition of coverage. By the end of 2024, MFA on email, VPN, and remote access was table stakes. No MFA, no policy. Not higher premiums — no policy at all.
The same progression happened with endpoint detection and response (EDR). In 2023, EDR was recommended. By 2025, it became a binding requirement for mid-market and enterprise policies. Underwriters weren't waiting for NIST or the SEC to mandate it. They were reading their own claims data.
Cyber insurers drove MFA adoption from ~30% to ~90% in enterprise environments between 2022 and 2024 — faster than any government mandate, NIST guideline, or industry standard could have achieved. When the financial consequence of non-compliance is losing your insurance (not a fine in 18 months), organizations move immediately.
This matters because the same underwriters who mandated MFA and EDR are now studying the same claims data, the same threat intelligence, and the same actuarial models for a new class of risk: quantum-vulnerable cryptography. And the math is telling them exactly what it told them about MFA in 2022.
The Actuarial Math: Harvest-Now-Decrypt-Later Is a Ticking Liability
Every cyber insurance policy written today carries an embedded risk that doesn't show up in current claims data but is already priced into adversary behavior: harvest-now-decrypt-later (HNDL) attacks.
The concept is straightforward. Nation-state actors and sophisticated criminal groups are intercepting and storing encrypted network traffic today — TLS sessions, VPN tunnels, encrypted email, API calls. The data is useless now because they can't break the encryption. But they're betting (correctly, according to every credible quantum computing timeline) that within 5 to 15 years, a cryptographically relevant quantum computer will be able to decrypt RSA-2048 and ECDH in minutes using Shor's algorithm.
For insurers, this creates a nightmare scenario. Consider a policy written today for a healthcare organization that transmits patient records over TLS 1.3 with ECDH key exchange. The data is secure today. But if that traffic is being harvested — and U.S. intelligence agencies have publicly stated that it is — then the encrypted sessions captured in 2026 become plaintext patient records in 2033. The breach didn't happen when the data was captured. The breach happens when it's decrypted. And the claim lands on whoever holds the policy at that future date.
The Hidden Liability
Every encrypted session using RSA or elliptic-curve cryptography that is intercepted today becomes a potential claim in 5–10 years. Underwriters cannot price a 3-year policy if the cryptographic posture of the insured creates unbounded future exposure from data already in adversary hands.
Actuaries model risk over the policy period. A typical cyber policy is 1 to 3 years. But HNDL attacks extend the risk window indefinitely. Data exfiltrated under a 2026 policy could generate a claim in 2034 when quantum decryption becomes viable. The insurer who wrote the 2026 policy may or may not be on the hook (depending on claims-made vs. occurrence triggers), but the industry is collectively accumulating latent exposure that grows with every encrypted session that uses classical cryptography.
This is not speculative. The NSA's CNSA 2.0 guidance explicitly warns about HNDL. The White House's National Security Memorandum 10 (NSM-10) requires federal agencies to inventory cryptographic systems and begin migration. The risk is acknowledged at the highest levels of government. Insurers read these documents too.
The NIST Trigger: CNSA 2.0 and the January 2027 Deadline
The regulatory timeline provides the catalyst. CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) establishes concrete deadlines for post-quantum cryptographic migration in National Security Systems (NSS):
| Requirement | Algorithm | Deadline |
|---|---|---|
| Software/firmware signing | ML-DSA (FIPS 204) / LMS / XMSS | January 2027 |
| Web browsers/servers, cloud services | ML-KEM (FIPS 203) + ML-DSA | January 2027 |
| Legacy networking equipment | ML-KEM + ML-DSA | January 2029 |
| All remaining NSS | Full PQ suite | January 2033 |
January 2027 is nine months away. Every federal contractor, defense supplier, and cleared facility that handles NSS data must have post-quantum cryptography deployed for software signing and web services by that date. Organizations that fail to comply risk losing their contracts. For a defense contractor, losing a federal contract isn't just lost revenue — it's a business interruption event. And business interruption is a covered peril under most cyber policies.
Insurers will not wait for the claims to arrive. They will require policyholders in affected industries to demonstrate CNSA 2.0 compliance or PQ migration progress as a condition of coverage. The precedent is already set: when the SEC's cybersecurity disclosure rules took effect, insurers immediately began asking about them in applications. CNSA 2.0 compliance will follow the same path.
And it won't stop at federal contractors. The same pattern that drove MFA from "government requirement" to "universal insurance requirement" will drive PQ authentication from "federal mandate" to "commercial insurance mandate." Insurers led MFA adoption by modeling the claims data and realizing it was cheaper to mandate MFA than to pay MFA-related claims. The same calculation applies to post-quantum migration.
What Underwriters Will Ask in 2027
If you've filled out a cyber insurance application in the last two years, you've seen the MFA and EDR questions. Here's what the 2027 application will look like. These aren't predictions — they're the logical extension of existing underwriting trends.
Projected 2027 Cyber Insurance Application — Cryptographic Posture Section
1. Cryptographic Inventory: Have you completed a full inventory of all cryptographic algorithms used across your organization, including TLS configurations, key exchange mechanisms, digital signatures, data-at-rest encryption, and API authentication?
2. Post-Quantum Migration Timeline: Do you have a documented post-quantum cryptographic migration plan with milestones? What is the target completion date?
3. FIPS 203/204 Implementation: Have you implemented ML-KEM (FIPS 203) for key encapsulation and/or ML-DSA (FIPS 204) for digital signatures in any production systems? If so, which?
4. Harvest-Now-Decrypt-Later Mitigation: What measures are in place to protect data-in-transit from harvest-now-decrypt-later attacks? Do you use post-quantum key exchange for sensitive data channels?
5. Data-in-Use Protection: Are sensitive records encrypted during processing (not just at rest and in transit)? Do you use fully homomorphic encryption, secure enclaves, or equivalent data-in-use protection?
6. Cryptographic Agility: Can your systems switch cryptographic algorithms without full redeployment? How quickly can you rotate to new algorithms if a vulnerability is discovered?
Organizations that answer "no" to these questions in 2027 will face the same outcome that organizations without MFA faced in 2024: higher premiums, coverage exclusions, or outright denial. The only question is how fast the market moves.
The Premium Arbitrage: PQ Authentication as a Financial Advantage
When MFA became an insurance requirement, something interesting happened on the other side: organizations that had already adopted MFA saw their premiums drop 10 to 15 percent. Insurers weren't just punishing non-compliance — they were rewarding risk reduction. The actuarial data showed that MFA-protected organizations had materially lower claim frequency and severity.
If post-quantum authentication drives even a 10% premium reduction on a $500K annual policy, that's $50,000 in annual savings. H33's post-quantum authentication stack starts at the free tier. The ROI on insurance savings alone — before counting avoided breach costs — makes the business case trivial.
Post-quantum authentication will follow the same economics, but with a stronger effect. MFA reduces the probability of credential-based attacks. PQ authentication eliminates an entire category of future liability — the harvest-now-decrypt-later exposure. For an actuary, eliminating a risk category is worth more than reducing the probability within a category. We project PQ-ready organizations will see 15 to 25 percent premium reductions once underwriting models incorporate quantum risk, based on the precedent set by MFA and EDR adoption curves.
There's also a competitive angle. In industries where cyber insurance is mandatory (healthcare, financial services, government contracting), the cost of insurance directly affects margins. If your competitor has PQ authentication and you don't, they're paying materially less for the same coverage level. Over a 3-year policy cycle, that premium differential compounds into a meaningful cost advantage.
What H33 Provides for the Insurance Conversation
When your underwriter asks about post-quantum readiness, here's what H33 puts on the table:
FIPS 203/204 native implementation. H33 uses CRYSTALS-Kyber (ML-KEM, FIPS 203) for key encapsulation and CRYSTALS-Dilithium (ML-DSA, FIPS 204) for digital signatures. These aren't wrappers around third-party libraries. They're production-hardened implementations running at 2.17 million authentications per second on a single node. When the underwriter asks "have you implemented FIPS 203/204," the answer is yes, in production, at scale.
Harvest-now-decrypt-later protection by default. Every key exchange through H33 uses lattice-based post-quantum algorithms. There is no RSA or ECDH fallback in the authentication path. Traffic captured today cannot be decrypted by a future quantum computer because the key exchange never used a quantum-vulnerable algorithm. The HNDL risk is structurally eliminated, not mitigated. Read the full technical breakdown: Harvest-Now-Decrypt-Later Protection.
FHE eliminates the claim, not just the breach. Standard encryption protects data at rest and in transit. But data must be decrypted for processing — and that's where most breaches extract value. H33's fully homomorphic encryption means data is never decrypted during processing. If an attacker compromises the application server, they capture ciphertext. The data was never in plaintext. No plaintext exposure means no reportable breach under HIPAA's safe harbor provision and no claim under most cyber policies.
Compliance documentation your underwriter can verify. H33 maintains SOC 2 (In Progress), HIPAA, and ISO 27001 at 100% in Drata with continuous monitoring. The HATS certification adds seven cryptographically verifiable requirements specifically designed for AI-era risk. These aren't self-attestations — they're independently auditable compliance positions that give underwriters concrete evidence of risk reduction.
One API call to implement. The most common objection to PQ migration is complexity. H33 delivers post-quantum key exchange, FHE data protection, STARK zero-knowledge proofs, and Dilithium digital signatures through a single API. The migration cost is measured in hours, not months. A free tier is available at h33.ai/pricing so organizations can demonstrate PQ readiness to underwriters before spending a dollar.
The Timeline: Why 2027, Not 2035
The quantum computing threat timeline typically cited is 2030 to 2040 for a cryptographically relevant quantum computer. NSM-10 sets 2035 as the federal migration deadline. So why do we say insurers will mandate PQ authentication by 2027?
Because insurers don't wait for the threat to materialize. They act when the risk becomes unacceptable to price. MFA wasn't mandated because every non-MFA organization had been breached. It was mandated because the claims data showed that non-MFA organizations were significantly more likely to be breached, and the cost of those claims was destroying the loss ratio.
The same inflection point for PQ is approaching faster than the quantum computing timeline suggests, driven by three converging forces:
- CNSA 2.0 deadlines begin January 2027. Federal contractors who miss the deadline face contract loss. That's a business interruption claim. Insurers will require compliance to avoid underwriting that risk.
- HNDL exposure is already accumulating. Every month of delay adds more intercepted traffic to adversary archives. The latent liability grows whether or not a quantum computer exists yet. Insurers model future exposure, not just current claims.
- The MFA precedent is fresh. Underwriters who lived through the MFA mandate cycle know the playbook. They know that waiting for claims to spike before acting is more expensive than mandating controls proactively. They won't make the same mistake twice.
Add it up: regulatory deadlines, accumulating latent risk, and institutional memory of the MFA cycle. The result is that underwriters will begin requiring post-quantum cryptographic posture on applications by late 2026 or early 2027. By 2028, it will be a binding requirement for mid-market and enterprise policies. By 2029, it will be as universal as MFA is today.
What to Do Now
If you're a CISO preparing for your next insurance renewal, start the post-quantum conversation before your underwriter does. Organizations that present a PQ migration plan proactively signal sophisticated risk management — and sophisticated risk management gets better pricing.
If you're an underwriter reading this, you already know. The claims data hasn't spiked yet, but the risk models are flashing. HNDL is the asbestos of cybersecurity — the exposure is accumulating silently, the future liability is large, and the organizations that acted early will be the ones still insurable when the claims arrive.
If you're an insurance broker, this is your next conversation with every client. The organizations that implement PQ authentication now will get preferred pricing in 2027. The ones that wait will face the same scramble that the MFA laggards faced in 2024 — except this time, the migration is more complex and the stakes are higher.
The Bottom Line
Cyber insurers mandated MFA in 18 months. They mandated EDR in 12. Post-quantum authentication is next, and the CNSA 2.0 deadline in January 2027 is the trigger event. Organizations that implement post-quantum cryptography now will see lower premiums, broader coverage, and a competitive advantage in every industry where cyber insurance is a cost of doing business. H33 makes it a single API call. Start free at h33.ai/pricing.
Further reading: HNDL Protection | FIPS 203/204 Compliance Guide | Cost of PQ Migration | Cybersecurity: Next 10 Years | PQC Architecture | Get API Key