We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Day 1: Tuesday, November 6

7:00 AM — 8:15 AM
8:15 AM — 8:30 AM

Opening Remarks

  • Welcome by NetDiligence
  • Welcome by Platinum Sponsor
  1. John Merchant, Ascent Underwriting
8:30 AM — 9:30 AM

New Claims Paradigm: Data Protection and Cyber Liability

  • Group litigation and representative actions
  • Class actions on the UK horizon?
  • Increase in claims and rise in damages
  • Policy language evolution to comply with GDPR
  1. Ian Birdsey (M), Pinsent Masons
  2. Sandra Cole, Beazley
  3. Andrew Hill, Willis Towers Watson
  4. Anya Proops, 11KBW
  5. Neil Purslow, Therium
9:30 AM — 10:30 AM

Business Interruption

  • Status of market availability for significant cyber business interruption limits
  • Business interruption coverage: Cyber vs. Property
  • What is covered in typical BI wording and what is not
  • Difference in liability for different sectors
  • Who is buying and how much 
  1. Noona Barlow, AIG
  2. Lindsey Nelson, CFC Underwriting Ltd.
  3. Robert Parisi (M), Marsh
  4. David Umbers, Ascent
  5. Charlotte Worlock, Clyde & Co.
10:30 AM — 11:00 AM
11:00 AM — 12:00 PM

Breakout A: Silent Cyber Risk

  • What is silent cyber, why is it such a big topic and what are the regulatory requirements?
  • Best practices for building an exposure management framework
  • Review silent cyber claims we have seen in the market
  • Are there any solutions to overcome the challenge?
  1. Luke Foord-Kelcey, Aon Benfield
  2. Johnny Fraser, Capsicum Re
  3. David Legassick, CNA Hardy
  4. John Merchant, Ascent Underwriting
  5. Matthew Webb (M), Hiscox

Breakout B: Ransomware: Walkthrough of a Case

  • What a ransomware attack really looks like
  • Dos and donts in a ransomware incident
  • Should you pay ransom? And if so, how?
  • The forensics of a ransomware incident.
  1. Steven Hadwin, Norton Rose Fulbright
  2. Winston Krone, Kivu Consulting

Breakout C: GDPR: Management of a Multinational Cyber Breach

  • Pre-Breach planning
  • Vendor selections
  • Culture and language issues
  • Reconciling regulatory contradictions
  1. Hans Allnutt (M), DAC Beachcroft
  2. Dominic Cockram, Deloitte
  3. Cinthia Motley, Dykema
  4. Ryan Rubin, EY
  5. James Webster, Hiscox
12:00 PM — 1:15 PM
1:15 PM — 2:00 PM

Cyber War and Terrorism

  • Territorial considerations in defining acts of war and terrorism
  • Nature of state sponsored cyber attacks
  • Challenges in attribution of cyber attacks to specific bad actors or nation states
  • Coverage provisions addressing acts of war and terrorism
  1. Raheila Nazir (M), Chubb
  2. Marko Polunic, Munic Re
  3. VInce Vitkowsky, Seiger Gfeller Laurie LLP
2:00 PM — 2:45 PM

Breakout A: Industrial Internet of Things

  • Internet of things up and down the distribution chain
  • Critical infrastructure
  • Industrial Control Systems (ICSs)
  • Supervisory Control and Data Acquisition (SCADA)
  • Coverage gaps and overlaps
  1. Neil Hare-Brown, Storm Guidance
  2. Debbie Hobbs, Emergin Risk
  3. Matthew Hogg (M), Liberty Global Group
  4. Brett Warburton-Smith, Lockton

Breakout B: Blockchain & Cyber insurance

  • Blockchain v Cryptocurrency: A Primer
  • Insurance Approach to Blockchain Risks
  • Insurance Approach to Cryptocurrency Insurance Risks
  • Insurance Approach to Initial Currency Offerrings (ICOs)
  • Future of Blockchain
  1. Nicholas Berry, Norton Rose Fullbright
  2. Christopher Liu (M), AIG
  3. James Tuplin, AXA XL
  4. Ed Ventham, ParagonBrokers

Breakout C: Mechanics of Adjusting a BI Loss

  • Mechanics of adjusting BI Losses
  • Analogs between BI and Property
  • Coverage wording
  1. Adrian Brennan, Echelon Claims Consultants Ltd
  2. Anthony Herring (M), JLT
  3. Ben Hobby, Baker Tilly
  4. Luke Johnson, AmTrust
2:45 PM — 3:15 PM
3:15 PM — 4:00 PM

Modeling Cyber Risk

  • How models can be used to assess cyber exposures
  • Tools and benchmarks used to assess data aggregation exposure
  • Value of assessment tools
  • Case Study
  1. Mark Banks, Verisk
  2. Oli Brew, CyberCube Analytics
  3. Tom Harvey, RMS
  4. Stephen Wares (M), MS Amlin
4:00 PM — 4:45 PM

State of the Cyber Insurance Market

  • Long and short term view
  • Sustainable terms
  • How will technology shape future policies?
  • How will competitive forces shape future policies?
  1. Michael Bruemmer, Experian
  2. Alex Jomaa, Tokio Marine Kiln
  3. Sarah Stephens, JLT Specialty Limited
  4. Dan Trueman (M), AXIS
4:45 PM — 6:15 PM