Resilience

Resilience

Computer and Network Security

Your risk is our risk.

About us

At Resilience, we’re creating a new category that integrates cybersecurity, cyber insurance, and cyber risk management. Founded by experts from across the highest tiers of the US military and intelligence communities – and built by prominent leaders and innovators from the insurance, technology, and cybersecurity industries – our integrated cyber risk solutions connect risk quantification software, cybersecurity experts, and A+ rated cyber insurance, all purpose-built for middle and large organizations. Driven by our strong core values, we’re on a mission to make the world cyber resilient to material losses by helping organizations stay ahead of ‘the bad guys’. Resilience is proud to be backed by leading technology investment firms, including General Catalyst, Lightspeed Venture Partners, Intact Ventures, Founders Fund, CRV, and Shield Capital.

Industry
Computer and Network Security
Company size
201-500 employees
Headquarters
New York
Type
Privately Held
Founded
2016
Specialties
cyber risk management, saas, cyber insurance, and cybersecurity

Products

Locations

Employees at Resilience

Updates

  • View organization page for Resilience, graphic

    10,809 followers

    Meet Richard Figueroa. Richard is a Customer Success Manager at Resilience. Before joining the team, he built a strong background in Customer Success, Customer Operations, and Business Operations at companies like Yext, Zego, and Runa. Originally from Venezuela, Richard now calls the UK his forever home. In his spare time, he enjoys swimming, boxing, CrossFit, lifting weights, and hit-and-run workouts. He also has a lovely mini schnauzer—check out the photos of his adorable fur baby below! Want to join Richard? Check out our open positions: https://lnkd.in/g2spfzXb #Talent #CustomerSuccess #Hiring

  • View organization page for Resilience, graphic

    10,809 followers

    At this week's Zywave Cyber Risk Insights Conference, we tackled a crucial topic for today’s security leaders: How can organizations identify—and deploy—the most impactful cybersecurity controls? In the panel, "The ROI of Effective Cybersecurity Controls," our U.S. Head of Underwriting, Sarah Thompson answers this question. Here are some of her key takeaways: 🔹 Know your value at risk. Going beyond a list of potential threats, she advises organizations to estimate the plausible financial impact of these risks to guide investment decisions. Quantifying these losses enables targeted, meaningful investment in controls that mitigate specific risks. 🔹 Adopting a risk-first mindset. Many organizations still take a “controls-first” approach, implementing controls without connecting them to specific risks. Sarah encourages shifting to a risk-first mentality, where controls are strategically selected based on how well they reduce quantifiable risks. This approach avoids wasted resources and ensures a stronger alignment between security spending and actual threats. 🔹 Prioritizing return on controls. In budget-constrained environments, maximizing the ROI on controls is essential. Sarah recommends evaluating controls by their effectiveness in reducing risk relative to their cost, allowing organizations to make high-impact security investments that stretch their budgets further. 🔹 Lessons from recent events. Reflecting on recent events, Sarah noted that stronger controls and well-rehearsed response plans could have minimized the impact of certain incidents. With evolving threats, even modest control improvements can significantly enhance resilience. 🔹 Rewards for High Security Posture. A strong security posture doesn’t just improve risk management; it can also lead to more favorable terms on cyber insurance. In a market that rewards proactive risk management, a well-defined security posture is an asset when it comes to underwriting and premium reductions. Separately, our Global Head of Claims, Jeremy Gittler, moderated a panel called "Back in Action: Reducing Friction in Response and Recovery," where he oversaw an expert discussion on the collaborative efforts to restore systems quickly after wide-scale cyber incidents. Thank you, Sarah and Jeremy, for contributing to these incredibly meaningful conversations at this year's Zywave #CyberRisk Insights Conference. If you've also enjoyed this year's conference, please share your key takeaways with us below! 👇 #Cybersecurity #RiskManagement #CyberInsurance #Underwriting

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • View organization page for Resilience, graphic

    10,809 followers

    Exciting news! We've been shortlisted in two categories of the Intelligent Insurer's Cyber Insurance Europe Awards 2025 🏆 • Cyber Insurance Technology Provider • Cyber MGA of the Year This recognition reflects our team’s commitment to delivering top-notch solutions that empower the cyber insurance industry. Thank you to Intelligent Insurer for this opportunity, and congratulations to all the other finalists! 🙌 #CyberInsuranceAwardsEU #CyberMGA 

    • No alternative text description for this image
  • View organization page for Resilience, graphic

    10,809 followers

    Our Q3 data shows a 35% surge in cyber claims this year. Where does the spike come from? Here are the key insights from our recent claims data: 📈 Rising threats & shifting tactics: • The severity of Business Email Compromise (BEC) and ransomware attacks continues to rise year over year, with emerging threats in fraud transfer targeting new communication platforms. • A rise in transfer fraud claims signals that attackers are moving beyond email to social media and other channels to deceive targets. • What should you do? It’s critical to implement security awareness training that spans multiple platforms and integrates strict payment verification processes. 🏥 Sector-specific trends: • The healthcare, Manufacturing, and Transportation sectors remain top targets, with the healthcare sector particularly affected by ransomware and the CrowdStrike outage. • Distributed environments, like those in transportation, highlight challenges in coordinating updates across systems. With attackers expanding their reach, the need for adaptive security strategies and resilience planning is more urgent than ever. What other trends have you noticed? Share your observations with us below. 👇 #CyberRisk #Ransomware #Trends

    • No alternative text description for this image
  • View organization page for Resilience, graphic

    10,809 followers

    How do you ensure your cybersecurity strategy is actively reducing your risk? For 84% of Resilience Edge clients, the answer lies in our Cyber Risk Profile Builder—offering a unique, data-driven approach to taking control of loss reduction. Unlike any other provider, Resilience empowers clients to continuously engage with their risk posture through a dynamic platform built on over 200 signals, spanning IPs, domains, software, hardware, and employee activity. With this one-of-a-kind tool, clients gain unparalleled visibility to strengthen their security posture and reduce their potential for loss. Here’s what makes the Profile Builder so effective: • Comprehensive Risk Validation: Easily track your cybersecurity improvements and confidently present your posture to leadership—securing better insurance terms and lower premiums. • Proactive Loss Prevention: With continuous engagement, you benefit from an up-to-date, evolving view of your risk, helping you respond effectively to new cyber threats. Take the guesswork out of cybersecurity and secure the confidence you need to navigate your next boardroom conversation. Learn more about the Resilience Edge: https://lnkd.in/gaTkJfDQ #CyberInsurance #CyberRisk #RiskManagement #Cybersecurity

  • View organization page for Resilience, graphic

    10,809 followers

    A huge thank you to Tim Burke for hosting our Cyber Resilience Tabletop Exercise (TTX) in Denver last week and to our Director of Security and Risk Services David Meese, CISSP, GCIH, GDSA for running an engaging session. It was fantastic to see everyone dive into this hands-on simulation, building skills to help clients navigate a cyber crisis with confidence. Another shoutout to Devin Bennett, Andrew Cross, and Alex Carleton from the Resilience team for joining in and adding even more value to the experience. If you’re interested in participating in one of our future workshops, please drop a comment below! 👇 #IncidentResponse #RiskManagement #Cybersecurity #Training

    • No alternative text description for this image
  • View organization page for Resilience, graphic

    10,809 followers

    Meet Jordan Bacher, a Senior Product Manager at Resilience. Prior to joining Resilience, he spent 5 years with Rapid7, split between NYC and Boston, where he also attended Tufts University. Jordan grew up on the East End of Long Island and has always enjoyed being near the water, participating in a rowing crew for 3 years in college. Swipe through the carousel below to more about Jordan. 👇 If you're interested in joining our team, check out our open #Jobs: https://lnkd.in/g2spfzXb. #Talent #People #Hiring

  • View organization page for Resilience, graphic

    10,809 followers

    When key vendors experience disruptions, like the notable #CrowdStrike outage, what are the best steps for damage control? Read our CEO, Vishaal 'V8' Hariprasad's latest editorial in Dark Reading for advice on how to make informed decisions that benefit you in the long run. 1️⃣ Don’t rush to switch vendors after an outage. While frustrating, it’s important to evaluate the vendor’s overall performance rather than react to a single incident. Consider their track record: one issue doesn’t erase years of reliability. Ask yourself if this vendor offers the expertise and communication your team can rely on in the long term. 2️⃣ When considering a switch, remember it's not just about finding a new tool. It involves onboarding, training, adjusting workflows, and potential downtime. Implementing a new system takes time and resources. Assess these costs against the impact of the outage to determine if the change will enhance resilience or disrupt your operations. 3️⃣ Base decisions on data rather than emotions. Before switching vendors, quantify the potential impact. Work with leadership to outline risks in relatable terms, such as productivity loss, financial costs, and overall risk implications. Keep reading to understand how calculated leaps can fortify your business's cyber resilience: https://lnkd.in/gXmEbUm4 #Cybersecurity #CyberRisk #CyberResilience

    The Case Against Abandoning CrowdStrike Post-Outage

    The Case Against Abandoning CrowdStrike Post-Outage

    darkreading.com

Similar pages

Browse jobs

Funding

Resilience 3 total rounds

Last Round

Series D

US$ 100.0M

See more info on crunchbase