Time | Session | ||
---|---|---|---|
8:00 am - 9:00 am | Breakfast & Registration | ||
9:00 am - 9:15 am | Opening Remarks by our 2017 Conference Co-Chairs
| ||
9:15 am - 10:00 am | Keynote Address
| ||
10:00 am - 10:45 am | The Buyer’s Perspective A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.
| ||
10:45 am - 11:15 am | Morning Break | ||
Track 1: Cyber Insurance – The Product Track | Track 2: Quantifying Risk Track | Track 3: Defining the Risk – The Threat Track | |
11:15 am - 12:30 pm | 11:15am – 12:00pm The Digital Ecosystem: The Supply Chain Debate In today’s digital age, your supply chain is extremely vulnerable to cyber disruption – and an attack on one of your partners can have devastating effects on your ability to continue to trade. How do you manage your partners, suppliers and service providers? How will your insurance policy respond to a loss? Can you get insurance payout directly from your suppliers? This session will address digital supply chain risk and how the insurance market is responding. Panelists will address contingent business interruption, exclusions such as electrical surge and address how information should be shared between an insurance buyer and their carriers.
————————————– 12:00pm – 12:30pm Gaps and Overlaps Cyber perils are expanding at a rapid pace – and bleeding out of standalone cyber and into many other ‘traditional’ lines of business including property, crime, D&O. This session will address what cover you have and where. Speakers will address how to understand standalone, embedded and enterprise cover for cyber risks and discuss how to negotiate your portfolio of renewals to maximize cover.
| 11:15am – 12:00pm Confronting the Elephant in the Room: Risk Aggregation Measuring and managing aggregation has different drivers from the perspective of insurers & reinsurers. The session will cover both affirmative and silent cyber exposures. Learn from a diverse team how they are trying to understand and underwrite to this exposure.
————————————– 12:00pm – 12:30pm Managing Third Party Cyber Risk: From Vendor to M&A Third party cyber risk confronts organizations within a continually evolving threat landscape. How are CISO’s and risk managers able to assess and quantify the risks of 3rd parties including vendors, supply chain participants and acquisition candidates? How do tools — including security ratings — assist in risk evaluation? How can organizations best communicate their initiatives to the insurance community?
| 11:15am – 12:00pm GDPR: Implications for North American Companies The General Data Protection Regulation (GDPR) affects every company that maintains personal data about anyone living in the EU. What are the data storage and security issues non-European companies need to be aware of? What are the penalties for non-compliance? How will insurance respond? Legal, underwriting and risk management experts will share their insights.
————————————– 12:00pm – 12:30pm Nation State Attacks Why would your company be an attractive target for a Nation State? Is it even possible to defend against an attack by the world’s most sophisticated and well-funded hackers? This session will identify who the attackers are and what they are after, and examine the relative roles of the federal government and private companies in defending against these attacks.
|
12:30 pm - 2:00 pm | Conference Luncheon Cyber OverVue and what it means for your organization Advisen is proud to introduce Cyber OverVue, an analytics solution that leverages our proprietary cyber loss data to facilitate more effective, data-driven decision-making about the cyber risk of an organization. Please join us for this lunch workshop as we introduce Cyber OverVue and its features, and how you can use it to evaluate a company’s historical loss experience in terms of frequency and severity, as well as how their cyber program compares to their peers. | ||
Track 1: Cyber Insurance – The Product Track | Track 2: Quantifying Risk Track | Track 3: Defining the Risk – The Threat Track | |
2:00 pm - 3:15 pm | 2:00pm – 2:25pm SME: In a league of their own? How different is the risk landscape for small and medium-sized enterprises? How are insurers catering to SME’s specific needs when buying insurance? This session will address how to navigate the various policies available and present quotes to SME’s in the most streamlined way. Panelists will discuss how to smooth the application process for SME’s.
————————————– 2:25pm – 2:50pm CISO’s: What they need to know about Cyber Insurance Information Security professionals are increasingly involved in cyber insurance purchase – at risk identification and quantification, through carrier presentations and into the claims process. How can the insurance market – and risk managers – educate CISO’s on the value of cover and help them navigate the underwriting process? What are CISO’s most concerned about?
————————————– 2:50pm – 3:15pm Future-gazing Where is the cyber industry heading and how will it tackle risks as they evolve in the future? This session will address the shift from static risk analysis to more dynamic underwriting and examine how insurance is developing to help clients transfer risks more effectively across coverage and distribution.
| 2:00pm – 2:25pm Dire Scenario(s)? Weaponized Malware Out of Control Weaponized malware has created a new set of threats that we are just beginning to understand. While WannaCry and its brethren have had a limited impact, this could have unfolded differently. This “what-if” panel will review trends in weaponized malware and discuss scenarios for how it could impact security going forward.
————————————– 2:25pm – 2:50pm When Systems Stop Working: Measuring Business Interruption Exposures The increased reliance on technology within the connected economy has spawned new and more complex exposures. Identifying, measuring and managing Business Interruption and Contingent Business Interruption exposures has become a critical need. Leading providers will discuss the development of new techniques for measuring this exposure.
————————————– 2:50pm – 3:15pm Up Periscope: Underwriting Cyber Risk Given the inherent tension between simplifying the application process and the need for in-depth information, the need for better underwriting tools has never been greater. This panel will explore the emerging technologies to measure and underwrite risks. What tools are underwriters using? How do you measure the effectiveness of the tools that are used?
| 2:00pm – 2:25pm Employees: The Most Common Point of Information Security Failure Hackers grab the headlines, but your own employees represent your organization’s most significant information security vulnerability. More than any purchase of security software products, employee training, can produce a higher return on your information security investment. This session will examine effective techniques for minimizing your exposure to employee-related cyber losses.
————————————– 2:25pm – 2:50pm Ransomware: What’s in Store? What Can You Do? Ransomware attacks are now reaching pandemic proportions. Why the recent surge in large-scale attacks? What does the future hold? What can organizations do to protect themselves? Experts will examine the implications of the recent escalation in ransomware attacks and discuss both security measures and insurance coverage issues.
————————————– 2:50pm – 3:15pm When Machines Speak Machine-to-machine (M2M) technology is vital to an increasing number of businesses, but are the risks being adequately addressed? Too often security is an afterthought when developing and manufacturing devices designed to communicate only with one another. If they are connected through the Internet, though, they are vulnerable to hackers. This session will examine the state of M2M technologies, emerging threat scenarios, and what can be done to protect against attacks and their financial consequences.
|
3:15 pm - 3:45 pm | Afternoon Break | ||
3:45 pm - 4:30 pm | Survey Says… Cyber Threats and Solutions Join a freewheeling discussion of the conclusions and issues addressed within Zurich’s seventh annual survey on the current state of and trends in information security and cyber risk management. With a diverse representation, the panel will shed new light on corporate perspectives of the rapidly evolving threats they face and the role of insurance in addressing them.
| ||
4:30 pm - 5:00 pm | The View from the Top A rare opportunity to hear top insurance executives discuss their perspectives on the cyber insurance market, disclose the issues that most concern them, and explain how cyber business fits into their overall strategic vision.
| ||
5:00 pm - 6:00 pm | Closing Remarks & Reception |
We consistently deliver an audience that is comprised of 20% Risk Managers & Insurance Buyers, Brokers (20%), Insurance Carriers (36%), Lawyers (6%), Service Providers (9%) and other insurance professionals (9%).
Get more information and submit your speaker proposal.