[Verse 1] Pull out every policy from your filing cabinet drawer Property, liability, cyber, and more Black swan scenarios lined up in a row Time to match what you think you own Each certificate promises golden protection But the devil hides in clause inspection Flood exclusions, act of God denials Your coverage shrinks when chaos arrives [Chorus] Audit every line, map every gap Real versus assumed, close the trap Read the fine print, know what's excluded When black swans strike, don't be deluded Coverage audit, coverage audit Know your true shield before you need it [Verse 2] Cyber policy says data breach covered Until you read the nation-state buffer Pandemic clause seemed comprehensive 'Til supply chain breaks proved expensive Ambiguous language lawyers will exploit "Reasonable care" and "acts we can't avoid" Estimate the delta, calculate the void Between what's promised and what's deployed [Chorus] Audit every line, map every gap Real versus assumed, close the trap Read the fine print, know what's excluded When black swans strike, don't be deluded Coverage audit, coverage audit Know your true shield before you need it [Bridge] Earthquake, cyber-attack, pandemic wave What percentage will your insurer waive? Deductibles balloon when crisis hits Your million-dollar policy might pay fifty cents [Verse 3] Business interruption sounds bulletproof Until you discover the waiting period proof Sixty days before payments commence While your revenue bleeds through the fence Create a matrix, scenario by scenario Which policies respond, which ones say no Document the gaps in stark black and white Before disaster strikes in the night [Chorus] Audit every line, map every gap Real versus assumed, close the trap Read the fine print, know what's excluded When black swans strike, don't be deluded Coverage audit, coverage audit Know your true shield before you need it [Outro] Assumed coverage lives in hopeful minds Real coverage hides where small print binds Audit now, before the storm Knowledge keeps your business warm
← Building a Risk Transfer Strategy | Exercise 5.2: Layered Risk Transfer Design →