Zico van Rooijen
Senior Underwriter Cyber - PI
Crystal Building B
Rivium Boulevard 216-218
2909 LK Capelle aan den IJssel

AIG is a leading global insurance organization. Founded in 1919, today AIG member companies provide a wide range of property casualty insurance, life insurance, retirement products, and other financial services to customers in more than 80 countries and jurisdictions.


We offer a broad range of products and services, including traditional insurance, highly specialized solutions, and excess and surplus lines insurance to help businesses reduce emerging risks. Clients range from large, international, and mid-sized companies to small businesses, entrepreneurs, and non-profits worldwide.


We deliver award-winning protection against cyber threats and attacks. Our services and solutions can help your business manage risks, prevent losses, and resolve breaches. 


Preventing the domino effect
Data leaks and data losses can lead to regulatory fines and PR nightmares, while attacks could lead to shut-down servers and loss of both confidence and profits. AIG understands this and provides a package of protection that includes insurance and specialist advice.


24/7 response
Our CyberEdge Breach Response Team will access information assurance experts as well as a leading law firm to offer consultancy that can respond in a crisis and help our clients take the best course of action.


Fines and investigations cover
This includes data administrative investigations and fines from data protection regulators that are insurable at law.
Organizations will face the prospect of significantly increased fines and mandatory notification requirements. The GDPR makes data protection a boardroom level issue and will force organizations to closely examine how they would respond to a data breach.


Protecting reputations
Cyber incident response services include PR repair of company and individual reputations, breach coaching and any breach of information notification and monitoring costs.


Electronic data cover
This includes data restoration, recollection and recreation following a security breach or data leak