The content, agenda & speakers for each Advisen Insights Conference is planned by an Advisory Board that represents industry thought-leaders and influential marketplace participants. Each Advisory Board is unique for each conference event.
Advisory Board meetings and conference calls are led by Advisen’s Stacie Lilien, Event Content & Programming Manager.
• Dan Burke, National Cyber Practice Leader, Woodruff Sawyer • Bala Larson, Northwest/Midwest Regional Manager, US Tech & Cyber, Cyber & Executive Risk, Beazley • Florence Levy, West Zone Cyber Practice Leader, Marsh & McLennan Companies [2020 Conference Chair] • Lindsay Nickle, Partner, Lewis Brisbois • Rebecca Pearson, Associate Director, West Region Leader, Willis Towers Watson • James Reed, Assistant Vice President, Cyber & E&O Division, Allied World • Jenny Soubra, U.S Head of Cyber and Technology, Canopius Group • John Soughan, Insurance Product Manager, Arceo.ai • Brookes Taney, Vice President of Global Sales, Arete Incident Response |
It isn’t always clear who is behind a cyberattack. Criminal gangs, cyber vigilantes, terrorists, and nation-state actors may leave similar footprints, or may even try to imitate one another. Correct attribution, however, is critical for the war exclusion of a cyber policy to come into play. This session will look at the various threat actors, examine how any of them could be combatants in cyberwarfare, and explain the processes behind attribution.
The war exclusion in cyber insurance policies has come under attack as being impractical to administer and potentially unfair to policyholders. Without war exclusions, however, insurers and reinsurers could be exposed to ruinous aggregations of losses. Panelists will explain the potential consequences of weakening or eliminating the war exclusion and will examine alternatives such as public/private partnerships to insure cyber warfare risks.
Main Track | Discussion Track |
Case Study: NotPetya According to Western intelligence agencies, the devastating NotPetya virus was created by the GRU, Russia’s military intelligence agency. The initial release of NotPetya appears to be an act of cyber warfare. Many of the companies that were damaged by the virus, however, might best be described as collateral damage – they were not the intended targets of the attack. Are insurers justified in denying claims from these companies under the war exclusion? A panel of legal and insurance experts will examine the coverage issues in the NotPetya incident and discuss the potential ramifications for the cyber insurance market.
| How do you Determine Appropriate Limits? How do you determine adequate cyber limits? How does Cyber loss frequency & severity impact appropriate limits? Our speakers will lead a discussion to address issues related to choosing Cyber limits, and we’ll also refer to Advisen’s Cyber OverVue v2.0 to add a data perspective.
|
Every organization has first-party property exposure, but virtually everybody in the current cyber marketplace is focusing on third-party liability risks. In this presentation from Arceo.ai., learn how underwriters and risk advisors can seize growth opportunities on first-party cyber risks that others aren’t chasing.
Silent cyber is a problem for both insurers and policyholders. Insurers may find they are paying losses under policies never intended to cover cyber exposures, and policyholders may end up with coverage gaps when insurers attempt to limit their exposures. This session will examine both insurer and buyer silent cyber issues with a focus on the Lloyd’s mandate that all policies clearly state whether they provide coverage for cyber claims.
Silent cyber poses a vexing problem for cyber loss accumulation models, yet firms that license models claim to account for silent cyber exposures. Given the inherent ambiguity of silent cyber, what assumptions are modelers making? How reliable are model outputs? How should insurers and reinsurers use models to manage their silent cyber exposure? This session will look at the art and the science of modeling and managing silent cyber risk.
This popular session will present a panel of risk managers and CISOs, who will have the opportunity to discuss the cyber risk management and insurance issues that concern them. The panel will also offer their observations on how well the insurance industry is meeting their needs.
Main Track | Discussion Track |
The Rise of the Cyber Supervillain Cybercriminals have become savvier, better organized, and more dangerous. Whether through malware, ransomware, DDoS attacks, or sophisticated social engineering, they steal, exploit and disrupt seemingly with impunity. This session looks at state-of-the-art information security to see how it stacks up against the growing sophistication of cybercriminals. Who are the cybersecurity Avengers ready to take on an army of cyber supervillains?
| How do you Determine Appropriate Limits? How do you determine adequate cyber limits? How does Cyber loss frequency & severity impact appropriate limits? Our speakers will lead a discussion to address issues related to choosing Cyber limits, and we’ll also refer to Advisen’s Cyber OverVue v2.0 to add a data perspective.
|
Main Sessions | Discussion Track |
Claims in Focus: Managing a Vendor Breach No matter how robust and sophisticated a company’s own cyber defenses may be, it still may be vulnerable to less secure vendors. This session will look at the practical considerations when dealing with a security incident involving a vendor with a focus on contractual considerations and insurance coverage issues.
| Demystifying Cyber Loss Data My Board wants to know what other Cyber Loss events have happened to companies like ours. My client needs comparable loss information to select appropriate limits. If I underwrite this account, what Cyber potholes am I potentially stepping into? Our speakers will lead a discussion about what types of Cyber Loss data are available, how these datasets get used, and what spin-off Cyber products can result.
|
Main Session | Discussion Track |
Ransomware To pay or not to pay? What factors drive the insured’s response to a cyber extortion event? How much are companies paying, and what data exists to inform this topic? Our speakers will lead a discussion about this rapidly evolving topic with a focus on response decisions and lessons learned by previous occurrences.
| How Can Cyber Adoption Be Increased? “Cyber Ranks as Top Peril for Companies Globally for 1st Time,”according to an Allianz January 2020 report. If that’s true, why don’t more businesses buy Cyber? Some top 10 brokerages have shared that the portion of clients who have Cyber protection is in the single digits. Why? What factors are driving this gap, and what moves do brokers have? Our speakers will lead a discussion about growing Cyber adoption, and we’ll also refer to Advisen’s Cyber OverVue v2.0 to add a data perspective.
|
Near-instantaneous access to digital underwriting data combined with machine learning are transforming the way cyber insurance is sold and underwritten. Tech-savvy MGAs and insurers now offer small businesses a quote for cyber insurance in seconds and a bound policy within minutes, often based on little more than a business name and URL. Will similar technologies and distribution models eventually be applicable to larger insureds? This session will survey the cyber insurtech landscape and experts will explain how artificial intelligence and access to more and better information are likely to transform cyber insurance processes for all sizes and categories of risk.
The California Consumer Protection Act (CCPA) went into effect on January 1. Six weeks into the new Act, questions continue to multiply. Have any surprises or unintended consequences arisen? What is the status of draft regulations for enforcing the law? Do companies understand what is required for compliance? What are the potential consequences for non-compliance? This session will look at the roll-out of CCPA and what it means for California companies as well as companies throughout the United States.
Intangible assets have always been a problem for underwriters, due to the challenges in calculating the value of a damaged reputation, stolen trade secrets, or other intangible asset impairments. Digital technologies create new threats to intangible assets and cyber insurance underwriters are increasingly called upon to provide protection. Are intangible assets insurable? Is there an objective and equitable way to calculate damages? What are the coverage issues that must be addressed? A panel of experts will tackle these questions and offer their insights into providing much needed coverage for reputation damage and intellectual property loss.
An insurer may pay a claim, but that isn’t necessarily the end of the story. A data security breach may provide subrogation opportunities against network security companies, technology service vendors or businesses partners who fail to take reasonable measures to safeguard their systems. This session will look at trends in cyber insurance subrogation and explain how companies who were never a party to an original insurance claim may find themselves battling against allegations of negligence brought by a cyber insurer.
Forging in Fire: Building Security-Insurance Partnerships in a Time of Accelerating Cyber Risk
Tackling cyber risk requires real cooperation between the security and insurance sectors. Market forces are driving together cybersecurity professionals and the insurance industry as they seek to boost cyber resilience for their clients. From responding to the latest threats, to new methods of going to market, all parties to the discussion share common goals – this fireside chat will enlighten the audience on where challenges remain and how to best approach them.