The content, agenda & speakers for each Advisen Insights Conference is planned by an Advisory Board that represents industry thought-leaders and influential marketplace participants. Each Advisory Board is unique for each conference event.
• Erin Ayers, Editor, Advisen • Jim Blinn, Executive Vice President of Client Solutions, Advisen • Dave Bradford, Founder & EVP for Strategy & Strategic Partnerships, Advisen • Oliver Brew, Head of Client Services, CyberCube • James Burns, Cyber Product Leader, CFC Underwriting Ltd. • Michelle Chia, Senior Vice President, Head of Specialty Products E&O, Zurich • Adam Cottini, Managing Director, Cyber Liability Practice, Area Senior Vice President, Arthur J. Gallagher [2018 Conference Chair] • Yosha DeLong, Senior Vice President Head of Cyber Underwriting, Zurich North America [2018 Conference Chair] • Brad Gow, Global Cyber Product Leader, Sompo International • Sean Hoar, Partner, Lewis Brisbois • Julie May, VP, Cyber Solutions, FICO • Garin Pace, Cyber Product Leader – Financial Lines & Property, AIG • Bob Parisi, Managing Director, Marsh • Scott Stransky, Assistant Vice President and Director of Emerging Risk Modeling, AIR |
[Advisen's cyber conference] affords you the ability to be in front of market leaders; vendors; insureds; brokers and hear their thoughts on what is trending in terms of coverage, claims, etc. It is also a great venue to network.
Anju Owad Allied WorldThese events are where policy, direction, future challenges, and opportunities of our industry are shared and shaped. Two to three days spent here are worth a month of research and work. Block the time, pack your bags and book a seat! You won’t be disappointed, you’ll learn from those I’ve been working with in this space since 2005 as well as the best and brightest newcomers to the industry.
Jim Leonard InfoArmorMichael S. Rogers is a former US Navy Admiral served as the 17th Director of the National Security Agency (NSA) and Chief of the Central Security Service (CSS) concurrently from 2014-2018. He was also the second commander of the US Cyber Command (USCYBERCOM). He retired from active duty in June 2018, and recently joined the Board of Directors of CyberCube.
Join the discussion as we take a deep dive into Zurich’s eighth annual survey on the current state of and trends in information security and cyber risk management. Hear how regulation, big loss events, risk mitigation, and risk transfer vary between industry and company size. Learn how these variables influence cybersecurity controls and how they impact cyber insurance purchasing decisions.
Track 1: The Insurance Track | Track 2: The Threat Track | Track 3: The Technology Track |
11:00am – 11:45am Comparing and Contrasting Cyber Models Insurance buyers/modeler clients can’t easily visualize how a cyber model works, even with the understanding of how, for example, property catastrophe models work. This session would illustrate the form and function of the most prevalent models in the market and highlight the differences and similarities between them.
————————————– 11:45am – 12:30pm What will the Future “Cyber Policy” Look like? As cyber risks evolve and expand, so must the cyber insurance policies available in the market. This session will address the future of cyber as a risk that touches many lines of business with an eye toward practical solutions for those much-discussed gaps and overlaps in existing policies.
| 11:00am – 11:45am Mapping the Cyber Threat Landscape We will bring together a group of experienced cartographers to map the current threat landscape. While many of these landscape features will seem familiar to cyber travelers, cyber protagonists continue to seek the path of least resistance to your digital assets. The session will provide an overview of the latest trends and hints of how to combat them.
————————————– 11:45am – 12:30pm The Rising Threat to Cyber Physical Systems Cyber Physical Systems (CPS) are widely applied in critical infrastructures including industrial and commercial applications. The growth of these applications dramatically has increased the risk of physical damage resulting from sophisticated hacks or brute force attacks. This session will explore the threats and impacts associated with CPS in different environments.
| 11:00am – 11:45am Artificial Intelligence: The smartest solution to cybersecurity? Artificial Intelligence is now a nearly ubiquitous presence in our lives – just ask Alexa, she’ll tell you. In the information security realm, new breeds of AI-driven tools are making an impact on the ability of security professionals to detect and respond to system intrusions. How do these tools work? How valuable are they? What are their limitations? A panel of experts will explain the current state of the art and what it means for CISOs, risk managers, and cyber insurance underwriters.
————————————– 11:45am – 12:30pm Blockchain: How Bitcoin’s technology will transform information security According to some analysts, blockchain will be the most transformational technology since the internet itself. While that remains to be seen, blockchain – the technology behind Bitcoin and other cryptocurrencies – already is having an impact on a wide array of sectors, including cybersecurity. This session will explain how blockchain works, and will provide an overview of how the technology will touch nearly every aspect of data security and, consequently, cyber risk management and underwriting.
|
Track 1: The Insurance Track | Track 2: The Threat Track | Track 3: The Technology Track |
1:45pm – 2:20pm Hot Topics in Privacy/Cyber Regulation Regulatory activity on privacy issues has reached a fever pitch, with GDPR, the California privacy law, and New York’s DFS regulation for financial institutions. This session will address compliance, the practical impact on organizations and their insurers, as well as discussion of potential regulatory activity in the future.
————————————– 2:20pm – 2:55pm Let’s Get Cyber-Physical: Assessing Insurance Options for Operational Risk Manufacturers and other businesses without traditional data breach risks increasingly flock to the cyber insurance market, seeking solutions for cyber threats to their operational data and technology and business interruption concerns. Cyber-physical risk marks both a challenge and an opportunity for the insurance industry and this session will address the technical needs and insurance demands of buyers as well as the options available to them.
————————————– 2:55pm – 3:30pm The Three Cs of Cyber: Claims, Capacity, and Competition Capacity has flowed into the cyber insurance market, increasing competition and slowing premium increases even as claims keep coming. The panel will address claims activity in the market and how insurers both familiar and new to cyber insurance handle the pressure of competition.
| 1:45pm – 2:20pm Threats of Dependency on Common Providers In the second quarter of 2018, Amazon’s cloud revenues grew 49% to $5.44 billion, Microsoft Dynamics 365 revenue grew 61% and the medical transcription services market is estimated to have reached global revenues of $5 billion in 2017. As business dependency on common providers grows, it increases the aggregation of contingent business interruption exposures. Listen to a group of experts describe how techniques for monitoring and managing these exposures.
————————————– 2:20pm – 2:55pm Cybercrime Inc. The netherworld of cybercrime once was made up of lone wolves, hobbyists and loosely organized gangs of cyber thieves. Today companies are faced with highly professional criminal organizations that grow increasingly sophisticated, and increasingly dangerous. More and more of these gangs resemble well-managed companies comprised of specialized units backed by dedicated research teams. This session will peer into the shadowy world of organized cybercrime and explore the new challenges posed by well-run, professional criminal organizations.
————————————– 2:55pm – 3:30pm E-Commerce Hacks A new trend targeting ecommerce platforms that use common tools for content management, support chat and website analytics has led to some large losses. Learn more about how sophisticated hackers are targeting these third party services as a new focal point of monetization.
| 1:45pm – 2:20pm Underwriting and Technology: How new technologies provide insight and efficiency to cyber underwriting Cyber insurance underwriters have an abundance of platforms, dashboards, scores, and reports to choose from to help them be more knowledgeable and efficient. But what do underwriters really need to do a better job? This session will explain cyber underwriting processes, and provide an overview of the tools and technologies now available to make the those processes faster and smarter.
————————————– 2:20pm – 2:55pm Cyber Risk Start-ups: A growth driver in the InsurTech sector Investors poured a record $3.2 billion in capital into InsurTech companies in 2018, and 2019 looks to be an even bigger year. While most investments were in personal and small commercial lines ventures, cyber insurance is a rapidly growing segment as well. Why is cyber so attractive to investors? This session will explore trends in new cyber insurance-related companies, and where investors see this segment of the InsurTech market going in the future.
————————————– 2:55pm – 3:30pm Portable/Wearable Risks: How does portable technology and real-time data feeds change the risk landscape. What does it mean for liability? Tens of millions of people now walk around with small internet-connected computers attached to their bodies. Like other connected devices, these “wearables” can be hacked, raising liability issues. What can go wrong with wearables, and how is the insurance industry responding? This session will look at the explosion of portable connected devices, the liability issues they raise, and the current state of the art in insurance coverage.
|
When it comes to information security, CISOs and risk managers have the same objective – to protect their company’s assets. How they set out to achieve this common objective, however, can be very different, and perhaps even at odds. This is often due to different understandings of “risk” and sometimes even entirely different vocabularies to talk about risk and risk management. This session will explore the similarities and the differences in risk management approaches between CISOs and corporate risk managers and explain how the two can best work together to maximize the effectiveness of a company’s information security strategy.
Shawn Henry
Shawn Henry is the President of CrowdStrike Services, and leads a world-class team of cybersecurity professionals who aggressively and effectively investigate and mitigate targeted attacks on computer networks. Under his leadership, CrowdStrike has been engaged in significant proactive and incident response operations across every major commercial sector, protecting organizations’ sensitive data and networks.