Time | Session |
---|---|
12:00 pm - 1:00 pm | Lunch & Registration |
1:00 pm - 1:15 pm | Opening Remarks |
1:15 pm - 2:00 pm | Data Breach: Still the Goliath There are lots of shiny new threats out there, with the possibility to trip us up – but don’t forget that privacy and network security are still the main types of loss under cyber insurance policies. Using data from Advisen on cyber loss trends and recent event examples, the panel will explore the magnitude of a data breach event and ask how this has changed in the past year. Panelists will also ask if recent high-profile data breaches will result in increased demand for insurance.
|
2:00 pm - 2:30 pm | The Cost to Reputation Reputation is cited as a major concern for organizations when they suffer a data breach. How impactful is reputational damage to a business? How do you prove that you suffered a loss? This session will look at stock valuation, customer exodus and derivative lawsuits as a basis for establishing reputational harm. The panel will also touch on what insurance cover is available.
|
2:30 pm - 3:00 pm | Afternoon Break |
3:00 pm - 3:45 pm | GDPR: All You Need to Know This session will focus on the obligations of GDPR for international companies: What do you need to know about the legislation? How do you ensure compliance? What new roles do you need to create in your organization?
|
3:45 pm - 4:15 pm | Regulation Update This update will describe the US cyber regulation and litigation landscape and ask how to apply best practices in your organization. The session includes a discussion on the Equifax loss; How the ruling on Spokeo might change the magnitude of loss and the impact of the DFS ruling in New York in 2017. This session will also explore how ‘compliance does not equal security’. How do you avoid regulatory ‘box-ticking’ and strive to best protect your business from attack.
|
4:15 pm - 5:00 pm | Creating the Right Culture: Beyond Technology Cybersecurity is still considered largely an IT issue in many organizations. To effectively manage cyber risk, it’s important to look beyond technology and towards corporate culture and closing skills and talent gaps that can create vulnerabilities in IT/cyber departments. This session will address the importance of human capital in your cybersecurity response: how can employee training, creating a cyber-aware culture, employee engagement and finding talent enhance your cybersecurity posture? Using live examples, this session will offer practical guidance on risk managers can work with HR professionals and CISOs to implement human capital solutions most effectively in your cyber strategy.
|
5:00 pm - 6:00 pm | Closing Remarks & Reception |
Time | Session |
---|---|
8:00 am - 9:00 am | Breakfast & Registration |
9:00 am - 9:05 am | Welcoming Remarks |
9:05 am - 9:15 am | Opening Remarks by our 2018 Conference Chair
|
9:15 am - 9:45 am | Keynote Address
|
9:45 am - 10:30 am | The Buyer’s Perspective Hear from a panel of senior risk managers to learn about risk strategy and their interaction with the insurance market.
|
10:30 am - 11:00 am | Morning Break |
11:00 am - 11:45 am | Recent Events: Charting the Physical Shift This session will outline what happened in 2017 from a threat perspective, describing events such as Reaper, Petya/Not Petya and WannaCry. What happened? How did the events unfold and what’s new about them from a threat point of view? Panelists will discuss how the cyber threat landscape has changed and what types of incidents we should be expecting in the future.
|
11:45 am - 12:15 pm | Malware: Out of Control? Weaponized malware has created a new set of threats that we are just beginning to understand. While WannaCry and its brethren have had a limited impact, this could have unfolded differently. This session will address the growth of malware as a weapon in cyber crime and ask how it could manifest in future events.
|
12:15 pm - 12:45 pm | The Digital Ecosystem: Managing your Supply Chain In today’s digital age, your supply chain is extremely vulnerable to cyber disruption – and an attack on one of your partners can have devastating effects on your ability to continue to trade. How do you manage your partners, suppliers and service providers? How will your insurance policy respond to a loss? Can you get insurance payout directly from your suppliers?
|
12:45 pm - 1:45 pm | Conference Luncheon |
1:45 pm - 2:30 pm | Successful Recovery: Follow the Decision Tree This session will focus on the first 3-4 critical decisions after an incident that caused business interruption. How can things go well and how can they get off track? This session will look at what makes a good response to a non-data breach event and how you can change the course of events to manage a more successful response. Panelists will discuss pre-and post-breach actions, and the importance of getting the right people involved at the right time.
|
2:30 pm - 3:00 pm | Total Cost of a Claim: How to Make the Most of your Recovery As a buyer, how do you maximize recovery from a non-data breach event? This session will explore how to put together a proof of loss. The session will discuss the role of forensic accountants, and how to measure BI/CBI losses, including the different approaches to waiting periods and time-element claims.
|
3:00 pm - 3:30 pm | Afternoon Break |
3:30 pm - 4:15 pm | Where does Cover Belong? Cyber Gaps and Overlaps This session will consider the insurance market dynamics for cyber-related physical risks such as business interruption. For any individual risk, what cover is available – including business interruption, third party lawsuits and systems failure – and where?
|
4:15 pm - 5:00 pm | The Cyber Hurricane As cyber events take different forms and impact business more broadly, insurers are increasingly concerned about the potential impact of a single event that could lead to thousands of simultaneous losses across their portfolios. How are insurers addressing aggregation? This session will give insight into how carriers and reinsurers trying to understand and underwrite to cyber exposure. What is ‘silent cyber’ and what impact might it have on the availability of cyber insurance? Panelists will discuss how the insurance industry is responding to the potential of a ‘cyber hurricane’, looking at capacity, new sources of capital and reinsurance.
|
5:00 pm - 6:00 pm | Closing Remarks & Reception |
We consistently deliver an audience that is comprised of 20% Risk Managers & Insurance Buyers, Brokers (20%), Insurance Carriers (36%), Lawyers (6%), Service Providers (9%) and other insurance professionals (9%).
Get more information and submit your speaker proposal.