Thursday, October 21st – Theme: What’s Next for Cyber Risk?
10:00am-10:05am
Opening Remarks by Conference Chair
10:05am-10:50am
Modeling the Extensive Cyber Risk Ecosystem
How can modeling help the industry forecast supply chain risk in the future? Single points of failure have become a key concern for cyberattacks – this session will look at effectively capturing potential problems for both buyers and insurers. We’ll also evaluate several “cyber CAT” scenarios and see how successful modeling has been.
- Erica Davis, Managing Director, Global Co-Head of Cyber, Guy Carpenter [Moderator]
- Scott Hammesfahr, Solutions Consultant, Guidewire Cyence
- Ho-Tay Ma, Vice President, Professional Liability, PartnerRe
- Bethany Vohlers, Vice President, Verisk Cyber Solutions
10:50am-11:35am
Looking for the Light at the End of the Tunnel
What’s the rosy future for cyber insurance? When does the market turn the corner? Is new innovation on the horizon for products, services, and technology? Can risk managers take heart that C-suites and boards are sitting up and paying attention to cyber? How will this change risk management strategies and insurance negotiations for the better? Cross-industry collaboration and public-private sector partnerships are on the rise, perhaps paving the way for progress in a vital industry.
- Patrick McNally, Litigator, Beckage [Moderator]
- Lori Bailey, Chief Insurance Officer, Corvus Insurance
- Stephanie Snyder Frenier, VP Industry Solutions, VisibleRisk
- Shannon Groeber, Executive Vice President, CFC Underwriting
- Benjamin Vaughn, Senior Vice President, Chief Information Security Officer, Hyatt Hotels Corporation
11:35am-11:43am
Shop Talk: A Race Against the Clock: The Need for Speed to Recovery sponsored by CrowdStrike
When a breach occurs, speed to remediation and recovery is critical to minimize the impact on your business. Advanced persistent threats can quickly break out across your network, infecting your endpoints, laterally moving across your systems and disrupting your business operations. These very sophisticated, sustained cyberattacks often establish multiple points of undetected persistence in your network in order to infect your systems with malware or steal sensitive data over a prolonged period of time. These attacks are carefully planned and designed to infiltrate your organization, evade existing security measures and fly under the radar. Most importantly, if coordinated and effective countermeasures are not taken to remove all points of persistence, the attacker will continue to reinfect systems after initial remediation, causing further delays and interruptions to business recovery.
• Eric Bodkin, Director, Endpoint Recovery Services, CrowdStrike
• Adam Cottini, Director of Business Development – Americas Legal and Insurance Verticals, CrowdStrike
11:43am-12:13pm
Spotlight Speakers: Fireside Chat on the State of Cyber Insurance sponsored by Resilience
• Amy Chang, Director of Business Development, Resilience
• Justin Shattuck, Vice President of Security Operations, Resilience