{"id":156680,"date":"2026-04-16T14:32:14","date_gmt":"2026-04-16T12:32:14","guid":{"rendered":"https:\/\/denhartigh.nl\/?p=156680"},"modified":"2026-04-16T14:32:46","modified_gmt":"2026-04-16T12:32:46","slug":"the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2","status":"publish","type":"post","link":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/","title":{"rendered":"Cyber incidents: what recent data breaches teach us about cyber risk and insurance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_height_percent=&#8221;100&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;1&#8243; bottom_padding=&#8221;1&#8243; back_color=&#8221;color-nhtu&#8221; back_image=&#8221;156694&#8243; back_image_auto=&#8221;yes&#8221; back_position=&#8221;center bottom&#8221; overlay_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;20&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;5&#8243; z_index=&#8221;0&#8243; enable_bottom_divider=&#8221;default&#8221; bottom_divider=&#8221;gradient&#8221; shape_bottom_h_use_pixel=&#8221;true&#8221; shape_bottom_height_percent=&#8221;100&#8243; shape_bottom_color=&#8221;color-jevc&#8221; shape_bottom_opacity=&#8221;30&#8243; shape_bottom_index=&#8221;0&#8243; content_parallax=&#8221;5&#8243; uncode_shortcode_id=&#8221;906553&#8243; back_color_type=&#8221;uncode-palette&#8221; overlay_color_type=&#8221;uncode-palette&#8221; shape_bottom_color_type=&#8221;uncode-palette&#8221; row_height_pixel=&#8221;300&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; style=&#8221;dark&#8221; font_family=&#8221;font-165032&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; parallax_intensity=&#8221;4&#8243; parallax_centered=&#8221;yes&#8221; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;718693&#8243;][vc_empty_space][vc_custom_heading auto_text=&#8221;yes&#8221; heading_semantic=&#8221;h1&#8243; text_size=&#8221;fontsize-210105&#8243; uncode_shortcode_id=&#8221;153065&#8243;]Automatic Heading Text[\/vc_custom_heading][vc_icon icon=&#8221;fa fa-arrow-down4&#8243; icon_color=&#8221;color-xsdn&#8221; background_style=&#8221;fa-rounded&#8221; size=&#8221;fa-2x&#8221; outline=&#8221;yes&#8221; uncode_shortcode_id=&#8221;156215&#8243; link=&#8221;url:%23begin|&#8221; icon_color_type=&#8221;uncode-palette&#8221;][\/vc_icon][vc_empty_space empty_h=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;5&#8243; back_color=&#8221;color-210407&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; row_height_use_pixel=&#8221;&#8221; uncode_shortcode_id=&#8221;127372&#8243; row_name=&#8221;begin&#8221; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; font_family=&#8221;font-165032&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; column_width_pixel=&#8221;800&#8243; uncode_shortcode_id=&#8221;671492&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;751699&#8243; text_color_type=&#8221;uncode-solid&#8221; text_color_solid=&#8221;#ffffff&#8221;]Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.<br \/>\nThese incidents cause concern among consumers, but above all, they serve as a clear warning to organizations:<br \/>\na cyber incident directly affects the continuity of your business.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;4&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; row_height_use_pixel=&#8221;&#8221; uncode_shortcode_id=&#8221;737282&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; font_family=&#8221;font-165032&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; column_width_pixel=&#8221;800&#8243; uncode_shortcode_id=&#8221;462399&#8243;][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;702856&#8243;]<\/p>\n<h3 id=\"ember10976\" class=\"ember-view reader-text-block__heading-3\">Large organizations, recognizable vulnerabilities<\/h3>\n<p>In recent cyber incidents, criminals gained access to systems containing customer and member data such as names, addresses, email addresses, dates of birth, and bank account numbers. In some cases, the attacks led to extortion, phishing waves, and long-term consequences for those involved.<br \/>\nWhat stands out in these cases: <\/p>\n<ul>\n<li>They involved organizations with professional IT environments<\/li>\n<li>Attacks were sometimes only discovered after data had already been stolen<\/li>\n<li>The greatest impact occurred after the incident, not during the hack itself<\/li>\n<\/ul>\n<p>This makes it clear that cyber risks are not limited to &#8220;weak&#8221; or small organizations. Vulnerability often lies in processes, human actions, or supply chain dependency.[\/vc_column_text][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;168439&#8243;]<\/p>\n<h3 id=\"ember10980\" class=\"ember-view reader-text-block__heading-3\">A cyber incident is not an IT issue<\/h3>\n<p>Although cyberattacks are often technical in nature, the greatest consequences are usually organizational, legal, and financial. A data breach or system intrusion can cause business processes to come to a standstill, while simultaneously incurring high costs for investigation and recovery. Organizations face legal reporting obligations to regulators and data subjects under the GDPR, which places additional pressure on time and capacity. Furthermore, reputational damage can occur, and the trust of customers and partners can be compromised. Handling an incident also often requires intensive communication and extra efforts from customer service, while consequential damage in the form of phishing or fraud can persist for months. Many organizations underestimate these indirect consequences, while practice shows that these costs often weigh the heaviest.[\/vc_column_text][vc_column_text uncode_shortcode_id=&#8221;591567&#8243;]<\/p>\n<h3 id=\"ember10986\" class=\"ember-view reader-text-block__heading-3\">\u201cWe are too small to be a target\u201d<\/h3>\n<p>We still regularly hear: \u201cWe are not interesting to cybercriminals.\u201d The reality is different.<br \/>\nMost attacks: <\/p>\n<ul>\n<li>Are automated<\/li>\n<li>Target commonly used systems<\/li>\n<li>Do not distinguish between large or small<\/li>\n<li>Exploit human errors, such as phishing emails<\/li>\n<\/ul>\n<p>As soon as an organization works with digital data, email, online payments, or customer information, a real cyber risk exists.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;75&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;7&#8243; bottom_padding=&#8221;7&#8243; back_color=&#8221;color-nhtu&#8221; back_image=&#8221;156686&#8243; back_position=&#8221;center center&#8221; overlay_color=&#8221;color-jevc&#8221; overlay_alpha=&#8221;42&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;5&#8243; shift_y_fixed=&#8221;yes&#8221; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; row_height_use_pixel=&#8221;&#8221; uncode_shortcode_id=&#8221;125793&#8243; back_color_type=&#8221;uncode-palette&#8221; overlay_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;2&#8243; style=&#8221;dark&#8221; font_family=&#8221;font-165032&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; parallax_intensity=&#8221;4&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/1&#8243; uncode_shortcode_id=&#8221;102164&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h4&#8243; text_italic=&#8221;yes&#8221; sub_lead=&#8221;yes&#8221; text_uppercase=&#8221;&#8221; uncode_shortcode_id=&#8221;124980&#8243;]<\/p>\n<h3 id=\"ember10990\" class=\"ember-view reader-text-block__heading-3\">Management&#8217;s perspective on this development<\/h3>\n<blockquote id=\"ember10992\" class=\"ember-view reader-text-block__blockquote\"><p><em>\u201cCyber risk is not an incident that you resolve after the fact, but a strategic issue that requires attention beforehand. The extent to which you are prepared determines not only the financial impact but also the trust of customers, employees, and partners.\u201d<\/em><\/p><\/blockquote>\n<blockquote id=\"ember10994\" class=\"ember-view reader-text-block__blockquote\"><p>&nbsp;<\/p><\/blockquote>\n<p>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;4&#8243; back_color=&#8221;color-lxmt&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; content_parallax=&#8221;0&#8243; row_height_use_pixel=&#8221;&#8221; uncode_shortcode_id=&#8221;985947&#8243; back_color_type=&#8221;uncode-palette&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; font_family=&#8221;font-165032&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; column_width_pixel=&#8221;800&#8243; uncode_shortcode_id=&#8221;384313&#8243;][vc_column_text text_lead=&#8221;yes&#8221; text_color=&#8221;color-482803&#8243; uncode_shortcode_id=&#8221;221276&#8243; text_color_type=&#8221;uncode-palette&#8221;]<\/p>\n<h3 id=\"ember10995\" class=\"ember-view reader-text-block__heading-3\">Why cyber insurance starts with insight, not with the policy<\/h3>\n<p>Cyber insurance does not prevent a cyberattack, but it plays an important role in making the consequences manageable when things go wrong. This can provide support for technical investigations, legal and privacy issues, mandatory communication, and the recovery of damages or business interruption. At the same time, dealing effectively with cyber risks requires more than just a policy. In practice, we see that risks are often fragmented and underestimated, and do not sufficiently align with the actual IT environment. Therefore, a sound approach begins with insight: which data and systems are crucial, what is the impact of downtime, and which risks is an organization willing or able to bear itself? Only from that insight can prevention, internal processes, and insurance solutions truly reinforce each other.[\/vc_column_text][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;156293&#8243;]<\/p>\n<h3 id=\"ember10995\" class=\"ember-view reader-text-block__heading-3\">About Den Hartigh Adviesgroep<\/h3>\n<p>Den Hartigh Adviesgroep has been a renowned consultancy firm since 1916, supporting businesses and individuals with strategic and financial matters. The organization is known for its customer-oriented approach and broad expertise in the field of (Inland) Marine, High-Net-Worth and Film &amp; Events.[\/vc_column_text][\/vc_column][\/vc_row][vc_row unlock_row=&#8221;&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;4&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_height_use_pixel=&#8221;&#8221; uncode_shortcode_id=&#8221;304958&#8243;][vc_column column_width_use_pixel=&#8221;yes&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; column_width_pixel=&#8221;800&#8243; uncode_shortcode_id=&#8221;836332&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_color=&#8221;color-210407&#8243; text_size=&#8221;h1&#8243; text_uppercase=&#8221;&#8221; uncode_shortcode_id=&#8221;986249&#8243; text_color_type=&#8221;uncode-palette&#8221;]For more information[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221; uncode_shortcode_id=&#8221;212230&#8243;]Erik van der Kooij<br \/>\nMarketing\/PR manager<br \/>\nDen Hartigh Adviesgroep<br \/>\n078 676 9000<br \/>\n<a href=\"mailto:marketing@denhartigh.nl\">marketing@denhartigh.nl<\/a>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.  <\/p>\n","protected":false},"author":3,"featured_media":156695,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[88],"tags":[],"class_list":["post-156680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber incidents: what recent data breaches teach us about cyber risk and insurance - Den Hartigh Advisory Group<\/title>\n<meta name=\"description\" content=\"Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber incidents: what recent data breaches teach us about cyber risk and insurance - Den Hartigh Advisory Group\" \/>\n<meta property=\"og:description\" content=\"Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Den Hartigh Advisory Group\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-16T12:32:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T12:32:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/denhartigh.nl\/wp-content\/uploads\/2026\/04\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erik van der Kooij\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik van der Kooij\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/\"},\"author\":{\"name\":\"Erik van der Kooij\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/#\\\/schema\\\/person\\\/95ab09d4bca72bdbd4a4dda6e619446e\"},\"headline\":\"Cyber incidents: what recent data breaches teach us about cyber risk and insurance\",\"datePublished\":\"2026-04-16T12:32:14+00:00\",\"dateModified\":\"2026-04-16T12:32:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/\"},\"wordCount\":1394,\"image\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/denhartigh.nl\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/\",\"url\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/\",\"name\":\"Cyber incidents: what recent data breaches teach us about cyber risk and insurance - Den Hartigh Advisory Group\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/denhartigh.nl\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg\",\"datePublished\":\"2026-04-16T12:32:14+00:00\",\"dateModified\":\"2026-04-16T12:32:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/#\\\/schema\\\/person\\\/95ab09d4bca72bdbd4a4dda6e619446e\"},\"description\":\"Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/denhartigh.nl\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/denhartigh.nl\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber incidents: what recent data breaches teach us about cyber risk and insurance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/\",\"name\":\"Den Hartigh Advisory Group\",\"description\":\"Your security, our expertise!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/#\\\/schema\\\/person\\\/95ab09d4bca72bdbd4a4dda6e619446e\",\"name\":\"Erik van der Kooij\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab4374e111e902a1ee2bb89d30f37662dbe85490eece319a676939fa27410bf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab4374e111e902a1ee2bb89d30f37662dbe85490eece319a676939fa27410bf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab4374e111e902a1ee2bb89d30f37662dbe85490eece319a676939fa27410bf?s=96&d=mm&r=g\",\"caption\":\"Erik van der Kooij\"},\"url\":\"https:\\\/\\\/denhartigh.nl\\\/en\\\/author\\\/erik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber incidents: what recent data breaches teach us about cyber risk and insurance - Den Hartigh Advisory Group","description":"Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/","og_locale":"en_US","og_type":"article","og_title":"Cyber incidents: what recent data breaches teach us about cyber risk and insurance - Den Hartigh Advisory Group","og_description":"Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.","og_url":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/","og_site_name":"Den Hartigh Advisory Group","article_published_time":"2026-04-16T12:32:14+00:00","article_modified_time":"2026-04-16T12:32:46+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/denhartigh.nl\/wp-content\/uploads\/2026\/04\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Erik van der Kooij","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erik van der Kooij","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#article","isPartOf":{"@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/"},"author":{"name":"Erik van der Kooij","@id":"https:\/\/denhartigh.nl\/en\/#\/schema\/person\/95ab09d4bca72bdbd4a4dda6e619446e"},"headline":"Cyber incidents: what recent data breaches teach us about cyber risk and insurance","datePublished":"2026-04-16T12:32:14+00:00","dateModified":"2026-04-16T12:32:46+00:00","mainEntityOfPage":{"@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/"},"wordCount":1394,"image":{"@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#primaryimage"},"thumbnailUrl":"https:\/\/denhartigh.nl\/wp-content\/uploads\/2026\/04\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/","url":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/","name":"Cyber incidents: what recent data breaches teach us about cyber risk and insurance - Den Hartigh Advisory Group","isPartOf":{"@id":"https:\/\/denhartigh.nl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#primaryimage"},"image":{"@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#primaryimage"},"thumbnailUrl":"https:\/\/denhartigh.nl\/wp-content\/uploads\/2026\/04\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg","datePublished":"2026-04-16T12:32:14+00:00","dateModified":"2026-04-16T12:32:46+00:00","author":{"@id":"https:\/\/denhartigh.nl\/en\/#\/schema\/person\/95ab09d4bca72bdbd4a4dda6e619446e"},"description":"Cybercrime has long ceased to be a theoretical risk. Recently, the Dutch business community was once again confronted with several large-scale data breaches at well-known organizations. Hundreds of thousands, and even millions, of personal data records were exposed.","breadcrumb":{"@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#primaryimage","url":"https:\/\/denhartigh.nl\/wp-content\/uploads\/2026\/04\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg","contentUrl":"https:\/\/denhartigh.nl\/wp-content\/uploads\/2026\/04\/sasun-bughdaryan-KdCJ1nIkgOU-unsplash-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/denhartigh.nl\/en\/the-hermes-birkin-as-a-valuable-asset-how-to-optimally-insure-your-iconic-bag-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/denhartigh.nl\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Cyber incidents: what recent data breaches teach us about cyber risk and insurance"}]},{"@type":"WebSite","@id":"https:\/\/denhartigh.nl\/en\/#website","url":"https:\/\/denhartigh.nl\/en\/","name":"Den Hartigh Advisory Group","description":"Your security, our expertise!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/denhartigh.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/denhartigh.nl\/en\/#\/schema\/person\/95ab09d4bca72bdbd4a4dda6e619446e","name":"Erik van der Kooij","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4ab4374e111e902a1ee2bb89d30f37662dbe85490eece319a676939fa27410bf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ab4374e111e902a1ee2bb89d30f37662dbe85490eece319a676939fa27410bf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ab4374e111e902a1ee2bb89d30f37662dbe85490eece319a676939fa27410bf?s=96&d=mm&r=g","caption":"Erik van der Kooij"},"url":"https:\/\/denhartigh.nl\/en\/author\/erik\/"}]}},"_links":{"self":[{"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/posts\/156680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/comments?post=156680"}],"version-history":[{"count":5,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/posts\/156680\/revisions"}],"predecessor-version":[{"id":156701,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/posts\/156680\/revisions\/156701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/media\/156695"}],"wp:attachment":[{"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/media?parent=156680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/categories?post=156680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/denhartigh.nl\/en\/wp-json\/wp\/v2\/tags?post=156680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}