RISKWORLD™ 2025 Coverage: Arch’s Kyle Lutterman

At RISKWORLD™ 2025 in Chicago, Risk & Insurance editor in chief Dan Reynolds caught up with Kyle Lutterman, cyber product leader for Arch. What follows is a transcript of that discussion, edited for length and clarity.
Risk & Insurance: Thanks for meeting with us here at the conference Kyle. What’s your advice for selecting a cyber risk management vendor in today’s market?
Kyle Lutterman: In the current landscape, it’s crucial to look beyond the hype when evaluating new vendors in the cyber risk management space. Many vendors claim to be powered by AI, but it’s essential to partner with MSPs and resellers who have a comprehensive understanding of the strengths and weaknesses of various vendors.
These partners can help identify the best-in-class solutions, rising challengers, and those that may not live up to their promises. By focusing on the top contenders during POVs or evaluations, organizations can ensure they are onboarding the most effective solutions for their needs.
Separating the pretenders from the true performers is key to making informed decisions when selecting a cyber risk management vendor. Industry knowledge and expert guidance can help navigate the crowded market and find the best fit for an organization’s specific requirements.
R&I: What role can Arch play in helping clients select the right vendor for their needs?
KL: Arch offers a comprehensive solution to our insureds and brokers by maintaining a panel of four to five vendors. This allows us to understand the specific needs and preferences of our clients and match them with the most suitable vendor.
Rather than providing a single quote from one vendor, we leverage our relationships to obtain multiple competing quotes. By doing so, we can make informed recommendations and facilitate introductions between our clients and the vendors that best align with their requirements.
Our goal is to be a full-service provider, guiding our insureds and brokers through the vendor selection process. We strive to identify the optimal choice for each client based on a thorough assessment of their unique circumstances and the capabilities of our vendor partners.
R&I: How do you view AI as a potential tool in cyber risk management? Are you optimistic about its helpfulness?
KL: I am very optimistic about the potential of AI in cyber security. I believe its greatest value lies in enhancing operations, scalability, and the ability to find the proverbial needle in the haystack.
AI can effectively focus on the most critical aspects by identifying and removing unnecessary elements from networks and user inboxes. This is particularly important given the vast amount of data generated through emails, EDRs, and other security solutions.
I anticipate that the adoption and effective utilization of AI in organizations will be a significant trend in the coming months and years. It has the potential to revolutionize how we approach cyber risk management and strengthen our defenses against ever-evolving threats.
R&I: What role do you see AI playing in cybersecurity, and how should organizations consider adopting it?
KL: Inboxes are one of the most sought-after attack vectors, and while many vendors are doing a great job of protecting them, there is still significant risk. Having vendors that can clean up inboxes and endpoints is a good way for organizations to start adopting AI in cybersecurity.
Being able to identify which alerts need to be acted on the fastest can greatly assist SOC teams. AI can help filter and prioritize alerts, acting as a first line of defense. This allows security teams to focus their efforts on the most critical threats.
R&I: Beyond AI and vendor assistance, what are the critical components of a strong cybersecurity strategy for organizations today?
KL: Fundamentally, it comes down to getting the foundational elements right. This includes patching externally facing vulnerabilities on a priority basis and being able to detect and respond to critical alerts when needed.
Having an EDR solution and a 24/7 SOC in place is crucial. It ensures that your network is being monitored even when your security team is asleep or during off-hours like holidays and weekends. We often see threat actors engaging in ransom attacks outside of regular business hours.
Most people wake up on a Monday morning to find their entire network down, despite it being fine on Friday. Having the awareness, visibility, and ability to detect and respond accordingly to such incidents is absolutely critical in making your network as strong as possible. &