The content, agenda & speakers for each Advisen Insights Conference is planned by an Advisory Board that represents industry thought-leaders and influential marketplace participants. Each Advisory Board is unique for each conference event.
• Oli Brew, Head of Client Services, CyberCube Analytics • Michelle Chia, Head of Professional Liability and Cyber, Zurich North America • Adam Cottini, Director of Business Development - Americas Insurance & Legal Verticals, CrowdStrike • Joe DePaul, Head of FINEX Cyber/E&O, North America, Willis Towers Watson [2019 Conference Co-Chair] • Bobbie Goldie, Senior Vice President, North America Financial Lines, Chubb • Alex Jomaa, Underwriter, Enterprise Risks, Tokio Marine Kiln • Ali Khodabakhsh, Senior Cyber Underwriter, Munich Re • David Lewison, Professional Lines National Practice Leader, AmWINS • John Merchant, Managing Director, Cyber Insurance - US & Canada, Ascent • Lindsay Nickle, Partner, Lewis Brisbois [2019 Conference Co-Chair] • Garin Pace, Cyber Product Leader - Financial Lines & Property, AIG [2019 Conference Co-Chair] • Noel Pearman, SVP, Cyber Product Line Leader, AXA XL • Meredith Schnur, US Cyber Brokerage Leader, Marsh • Shay Simkin, Global Head of Cyber, Howden • Geraldine Spry, VP, Enterprise Risk and Global Insurance, Estee Lauder • Brookes Taney, Vice President of Sales, Arete Advisors • Marc S. Voses, Partner, Goldberg Segalla |
Hear from Dr. Alex Kogan, specialist in big data and positive psychology. He is perhaps best known as the researcher at the heart of the Cambridge Analytica controversy who built the personality models that became the focus of international scrutiny after Facebook used them to collect extensive data from its users. Hear the inside story of how this scandal arose and the impact this has had globally on privacy discussions.
The traditional insurance industry notably lags in embracing change, but the fast-moving cyber world has the opportunity to forge new ground in the areas of inclusion and equality. Bringing broader perspectives to the market improves innovation and adds new expertise, as well as addresses perennial concerns about encouraging talented individuals to carry the industry forward into the future. With this panel, we’ll discuss both successful initiatives already in place and offer ideas for how to improve diversity in all organizations.
Join the discussion as we take a deep dive into Zurich’s ninth annual survey on the current state of and trends in information security and cyber risk management.
For more information on Zurich please visit https://www.zurich.com/
Track 1: Insurance Track | Track 2: Modeling/Technology Track | Track 3: Threat Track | Track 4: Advisen Discussion Track |
12:15 pm – 12:45 pm To Market, To Market: Underwriting and Pricing Cyber risk in Today’s World Cyber insurance is at a crossroads as coverage expands amid a competitive marketplace. Can the market maintain underwriting and pricing discipline while crafting policies that offer protection against the wide range of risks? This panel will address building financial sustainability into the cyber insurance marketplace and ensuring the relevance and effectiveness of cyber policies as exposures continue to change.
12:45 pm – 1:15 pm Rise of the Mega-Fines: Accounting for Regulatory Action in Cyber Insurance With numbers like $5 billion and $700 million being handed down by regulators for data breaches and the implementation of the California Consumer Privacy Act on the horizon, the cyber insurance industry faces many questions about whether and how fines and penalties can be insured. Where should we expect regulatory actions to go from here and how can organizations best prepare their insurance program to respond?
| 12:15 pm – 12:45 pm Cyber Insurtech Investing Trends While competition in the cyber risk arena keeps increasing, investors continue to pour money in the space. Do they know something we don’t? What problems are they looking to solve that show promising returns – distribution, underwriting, risk quantification, or others? Our panel of sophisticated investors will explore who is investing and why.
12:45 pm – 1:15 pm A Pen-tester’s Approach to Underwriting There are several “outside – in” cyber risk assessment services available today for individual account underwriting. Does wide acceptance mean that these services are effective or are do they perhaps miss some key risk indicators? Are there cost-effective alternatives that provide additional efficiency and insight? This session will bring together outside perspectives to challenge the accepted approaches to underwriting risk analysis.
| 12:15 pm – 12:45 pm Physical Fitness: Protecting Connected Objects from Cyberattack From tiny pacemakers to massive nuclear power plants, a vast and growing array of objects is connected to the internet. Virtually every individual and business is now exposed to the consequences of hackers seizing control of sensors or operating systems in devices located throughout homes, retail locations, factories, offices, and healthcare facilities — and sometimes on ourselves. This session will explore the vulnerabilities of physical systems, the steps businesses should take to address them, and how insurers are responding to this growing exposure.
12:45 pm – 1:15 pm Emerging Threats: More Things to Keep You Awake Risk never sleeps. Apparently, neither do cybercriminals. They seemingly work around the clock to spread misery with innovative and destructive criminal schemes. This session will survey the threat landscape to identify emerging threats that will challenge information security and cyber insurance professionals in the coming months and years. Topics to be discussed include mobile malware, biometric hacking, AI-powered attacks, and the growing sophistication of ransomware and social engineering attacks.
| 12:15 pm – 12:45 pm Cost per Record: What is Fact Vs Fiction? There are numerous sources of the per record cost of a data breach. Some sources include survey results while others rely on insurance claim data. While appearing to offer a level of precision, the answers vary so widely as to create doubt about which to believe. Join this discussion on the different sources and the pros and cons of using them to create loss cost estimates. If you are involved in estimating or modeling loss costs, you should consider joining this session.
12:45 pm – 1:15 pm How do you Determine Appropriate Limits? What factors influence the limit adequacy discussion between brokers and clients? How can brokers make clients aware of frequency and severity issues and best counsel clients on appropriate cyber coverage limits? Our panelists will share their experiences, and we’ll also refer to Advisen’s Cyber OverVue to add a data perspective. This discussion is aimed at brokers though all are welcome.
|
Join Advisen for an optional workshop session! Lunch will be provided.
Driving Efficiency in the Cyber Underwriting Process
With numerous evolving variables, writing cyber coverage efficiently and effectively is a challenge. Incomplete data on prospective clients and a lack of cyber loss history further interfere with the quick and profitable underwriting of new business. In this session, we will discuss today’s cyber threat environment and how machine learning and stochastic modeling can help cyber underwriters make better and faster decisions.
Track 1: Insurance Track | Track 2: Modeling/Technology Track | Track 3: Threat Track | Track 4: Advisen Discussion Track |
2:45 pm – 3:30 pm When the Cyber Claim Comes In Ransomware, business interruption, compromised vendors, nation-state attacks – cyber claims run the gamut of risks. Are cyber policies meeting the expectations of insureds when it comes to claims? How can the cyber insurance industry better communicate the value of the coverage in advance of a claim? The session will feature a wide-ranging discussion on determining the financial impact of cyber claims, the difficulties inherent in attack attribution, as well as misconceptions about cyber coverage.
3:30 pm – 4:00 pm Blurred Lines: The Wider Insurance Impact of Cyber Risk Cyber risk increasingly has an impact on non-traditional industries like marine, aviation, and agriculture, to name a few. Additionally, the effect of big breaches on directors and officers and transactional risk and vendor risk must be considered by insurers, brokers, and buyers as they navigate their insurance planning.
| 2:45 pm – 3:30 pm Session A – Comparing and Contrasting Cyber Aggregation Models These back-to-back sessions will provide a consumer’s perspective on aggregation modeling. The first session will provide a foundation while the second will work through an example of the application of aggregation modeling. In this session, representatives of leading modeling companies will introduce their company and models, the use cases and the approach they use. We will discuss some of the important inputs to the second session including the underlying data, scenario construction, use cases and some of the key definitions.
3:30 pm – 4:00 pm Session B – Comparing and Contrasting Cyber Aggregation Models In this second session, we will discuss the results from the modeling firms. We will describe a synthetic portfolio that was shared with the panelists and then discuss the results. This session will rely on a user’s perspective to probe the results to understand how they should be interpreted. As there is no right or wrong answer, the objective of the session will be to provide the panelists an opportunity to help interpret the results and explain the source of any differences.
| 2:45 pm – 3:30 pm Reporting From the Front Lines: Real-Life Tales from the War Against Cybercrime Most companies will eventually experience a significant cyber event. Hear from experts on the steps organizations can take before a data breach or other event to ready themselves for a quick response, and what they should do afterward to assure a successful recovery and avoid reputation damage.
3:30 pm – 4:00 pm This Isn’t Your Parents’ Internet: Generational Differences Concerning Privacy and Cybersecurity A persistent media theme is that digital natives are comfortable living their lives openly over social media, but their parents, and especially their grandparents, are likely to demand a higher degree of privacy. Is there a sharp divide between generations around privacy and online security concerns? If so, what do changing attitudes mean for organizations whose customers span generations and for lawmakers considering legislative solutions to thorny privacy issues? A panel of experts will examine the factors that influence attitudes towards privacy and their impact on privacy-related regulation and litigation.
| 2:45 pm – 3:30 pm Cyber Secondary Related Risk: How Do You Quantify Silent Cyber as Well as Downstream Impacts of Cyber Loss Events? The topic of silent cyber continues to challenge underwriters, actuaries and those responsible for ERM. As an increasing number of downstream loss impacts manifest themselves, the discussion broadens regarding capturing and quantifying the entire impact of a cyber loss. Join this engaging session to share ideas and experiences regarding how to solve this rubik’s cube.
3:30 pm – 4:00 pm How Do You Get Your Voice Heard in a Crowded Cyber Marketplace? Join us for a discussion about strategies to get noticed and grow marketplace awareness of your cyber products and services.
|
Arceo’s Ben Beeson chats with Jim Sciutto, CNN’s Chief National Security Correspondent, about his recent book, The Shadow War, a guide to the invisible fronts of modern warfare, including cyber warfare. Learn why America may be at risk of losing a war few people realize we are fighting. Stay after the session to meet Mr. Sciutto and get a signed copy of his book.