Time | Session | |
---|---|---|
12:00 pm - 1:00 pm | Registration | |
1:00 pm - 1:15 pm | Opening Remarks by our 2017 Conference Co-Chairs
| |
1:15 pm - 2:15 pm | Health Care CISOs Speak: Recent Successes, Challenges, & What’s Top of Mind for 2017 Priorities Hear from a group of CISOs as they share their insights into “what’s worked” – “what’s still to be determined” – and what is most concerning for them looking ahead into 2017 based on recent risk developments in the landscape, breach events, regulatory enforcement. What do they anticipate seeing as new directions or impacts to them from the new Administration?
| |
2:15 pm - 3:00 pm | It’s an Enterprise Issue: Perspectives on Latest Developments in the Health Care Threat Landscape Since Cyber has been touted as the “new D&O”, it really is an enterprise-wide concern; not just a worry for corporate IT departments. Different perspectives will weigh in on how they see the latest legal, regulatory and settlement/claim developments in the health care landscape impacting organizations, and what organizations would be best advised to consider to mitigate the impact of the inevitable data breach to their organizations.
| |
3:00 pm - 3:30 pm | Afternoon Break | |
3:30 pm - 4:15 pm | Pre-Incident Planning for Health Care Organizations: Best Defense – or Offense? When an incident occurs, it is crucial for a healthcare organization to have as much evidence as possible that the organization was not negligent, but instead forward thinking, aware, and making best efforts to mitigate a cyber event. This session will outline how to be prepared for a breach, in order to best defend its HIPAA compliance once it happens. This session will outline how planned, well documented and executed risk mitigation and compliance efforts pre-breach can pay real dividends down the road.
| |
4:15 pm - 5:00 pm | It’s Happened… Who Gets the First Call… and the Second? Recognizing that a host of invested parties want to know your organization has had a privacy/security “event” – who should get called first? Second? A panel of experts will provide some best practices for how to handle your cyber event.
| |
5:00 pm - 6:00 pm | Closing Remarks & Reception sponsored by: |
Time | Session | |
---|---|---|
8:00 am - 9:00 am | Breakfast & Registration | |
9:00 am - 9:05 am | Welcoming Remarks | |
9:05 am - 9:15 am | Opening Remarks by our 2017 Conference Co-Chairs
| |
9:15 am - 9:45 am | Keynote Address
| |
9:45 am - 10:30 am | The Buyer’s Perspective A panel of senior risk managers will discuss the challenges they face in identifying and addressing the cyber risk exposures of their organizations. Insurance solutions will be evaluated, and panelists will share their insights into how well the insurance market is addressing their cyber risk needs.
| |
10:30 am - 11:00 am | Morning Break | |
Identifying and Quantifying Threats How do you keep on top of emerging trends and understand what might be coming down the line? This series of sessions will hear from threat intelligence professionals who monitor and mitigate cyber threats on a daily basis. What do they see as the major threats to be aware of in 2017 and beyond? These sessions will offer some practical tips on how to quantify cyber exposures and risk. Where can you go to find out? How do you distinguish between the various tools available? | ||
11:00 am - 12:30 pm | Track 1 / A Technical Approach 11:00 – 11:30am / The Industrial Internet of Things
11:30am – 12:00pm / Industrial Control Systems
12:00pm – 12:30pm / Business Interruption – The Threat Landscape
| Track 2 / Layer 8: Human Intervention with Technology 11:00 – 11:30am / The Consumer Internet of Things
11:30am – 12:00pm / Extortion and Ransomware
12:00pm – 12:30pm / The Insider Threat posed by your own employees
|
12:30 pm - 1:30 pm | Conference Luncheon | |
1:30 pm - 2:15 pm | A Study on Insurance Risk Aggregation With increasing scrutiny on insurance companies and their ability to identify and mitigate aggregation exposure, this session will consider the impact of cyber on silent coverages. How is new technology creating threats in unexpected policies? How do insurance companies identify, monitor and aggregate these exposures? What implications might new threats have on existing lines of cover, such as GL and Property?
| |
Gaps and Overlaps: The Coverage Conundrum | ||
2:15 pm - 3:00 pm | Business Interruption: Insurance Hot Potato? How are property and cyber insurance policies responding to business interruption cover? This session will discuss the confusion around contingent business interruption insurance for cyber and where coverage might lie. Panelists will outline the main sources of loss and discuss the various insurance solutions available and how they might be improved.
| |
3:00 pm - 3:30 pm | Hacking on the Rise: Cyber vs. Crime Where does a cyber claim really belong: a crime or cyber policy? Leading cyber professionals evaluate the current state of the market in terms of crime vs. standalone cyber policy coverage, the historical and current purpose of each product, and how the mercurial claim landscape of cyber events is impacting both lines of coverage concurrently.
| |
3:30 pm - 4:00 pm | Afternoon Break | |
4:00 pm - 4:30 pm | The Anatomy of a Claim: A Study on Costs Using real case studies, this session will dive into the various costs that drive cyber claims and outline how claims are adjusted. The speaker will explain how expenses, regulatory and liability costs are adjusted and how costs flow up- or down-stream of the original event.
| |
4:30 pm - 5:15 pm | Reaching Capacity? This session will look at insurance buying trends and address available capacity in the insurance market. How much cyber insurance should you buy? Is there enough capacity? Is the market profitable and sustainable?
| |
5:15 pm - 6:15 pm | Closing Remarks & Reception sponsored by: |
We consistently deliver an audience that is comprised of 20% Risk Managers & Insurance Buyers, Brokers (20%), Insurance Carriers (36%), Lawyers (6%), Service Providers (9%) and other insurance professionals (9%).
Get more information and submit your speaker proposal.