Sep 30 — Oct 02


We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Announcing our Keynote Speaker!

NetDiligence® is excited to announce that Chris Rock, CEO of SEIMonster and global hacking expert, will be giving the keynote address on Thursday, June 13, 2019. Chris Rock has been an active participant in the Security Industry for over 20 years working in four different banks and CEO of a penetration testing company. He is the CEO and co-founder of SIEMonster. Chris is continually researching vulnerabilities and has twice been invited to present at DEFCON, the world's largest hacking conference:

"I will kill you and birth you"

"How to overthrow a government"

Intro to Cyber

NetDiligence® invites students, interns and summer associates to spend June 13, 2019, with us at the Cyber Risk Summit. In the morning, you'll attend our groundbreaking Intro to Cyber program developed for future insurance, legal and technical security professionals. For the remainder of the day, you're invited to participate as an attendee in the main conference. This event is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at [email protected] to obtain your Discount Code.

Day 1: Wednesday, June 12

12:00 PM — 2:00 PM

Women In Cyber Lunch

Join NetDiligence® at the second Women in Cyber Lunch, a networking event for women cyber leaders from around the country. This year’s keynote will be Shelley Ma, Associate Director of Cyber Investigations at Kivu Consulting in Toronto. Shelley is an EnCE-certified digital forensic analyst and specializes in ransomware investigations, digital forensic investigations, and incident response. Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr. This optional event costs $30.00 and will be added to your conference registration. The lunch is open to all women attendees!
  1. Shelley Ma, Coalition
3:00 PM — 4:30 PM

Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)

  • An understanding of the more recent, and prevalent, cyber security threats
  • An overview of legal, compliance and response obligations
  • Strategies on dealing with hackers and media during a breach
  • How to mount a response and what services and products to include
  1. Andrew Liuzzi (M), Deloitte
  2. Ian Kelly, ZeroFox
  3. Bilal Malik, Stroz Friedberg
  4. Brian Thornton, ProWriters
  5. Melissa Ventrone, Clark Hill PLC

Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)

  • An understanding of the more recent, and prevalent, cyber security threats
  • An overview of legal, compliance and response obligations
  • Strategies on dealing with hackers and media during a breach
  • How to mount a response and what services and products to include
  1. Micah Howser (M), NetDiligence
  2. Hans Allnutt, DAC Beachcroft
  3. Allen Burzen, GBMS USA
  4. John Cleary, Polsinelli PC
  5. Joe Mann, Arete
  6. Joe Niemczyk, Markel
  7. Erin Walters, USI Insurance Services

Option C: Cyber Claims Handling Best Practices Workshop

  • Distinguishing carriers
  • Readiness of the claims unit who will actually handle a cyber claim
  • Mitigating derivative risk to the policyholder and reducing cost for the insurer
  • How are claims adjusted and processed
  • How are vendors selected
  • Coordination between lines
  1. Karen Painter Randall (M), Connell Foley LLP
  2. Karrieann Couture, Aon
  3. Jason Rebholz, Corvus Insurance
  4. Richard Sheridan, Berkley Cyber Risk Solutions
  5. Jena Valdetero, Greenberg Traurig LLP

Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms

  • Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process
  • Risk Assessment and Verification Process
  • Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity
  • Lawyer’s Professional Liability & Third Party Claims
  • Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training
  • Incident Response Planning
  1. Stu Panensky (M), Pierson Ferdinand LLP
  2. John Barrett, BDP International, Inc
  3. Jennifer Beckage, The Beckage Firm
  4. Elissa Doroff, Mosaic Insurance
  5. Larry Hershman, Black Cipher Security
5:00 PM — 6:30 PM

Day 2: Thursday, June 13

7:00 AM — 8:30 AM
8:30 AM — 9:00 AM
9:00 AM — 9:45 AM

Claims and Losses Update: 2019 Trends

  • A Preview of the 2019 NetDiligence® Cyber Claims Study
  • Types of claims being covered
  • Examination of cost
  • Claims notice and claims handling
  1. Laurie Kamaiko (M), Saul Ewing LLP
  2. , Swiss Re
  3. Robert Flowers, Travelers
  4. Mark Greisiger, NetDiligence
  5. John Mullen, Mullen Coughlin LLC
9:00 AM — 12:15 PM

Intro to Cyber

The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and  Security & Legal Solutions.

After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at [email protected] to obtain your Discount Code.

  1. Doug Brush, Special Counsel
  2. Leslie Gravel, WTW
  3. George Holevas, Marsh
  4. Micah Howser, NetDiligence
  5. Anthony Koludrovic, Berkley Cyber Risk Solutions
  6. Georgea Mancuso, Black Marjieh & Sanford LLP
  7. Brookes Taney, Arete
  8. Ayesha West, Everest Insurance
  9. Madison Williamson, Hiscox
9:45 AM — 10:45 AM

Breakout A: Non-Affirmative Cyber from 50,000 Feet

  • Definitions
  • Non-affirmative impact in non-cyber lines
  • Coverage considerations
  • Product development and solutions
  • All Perils coverage
  1. Jon Laux (M), CyberCube Analytics
  2. Richard DePiero, Sompo
  3. Anthony Shapella, AIG
  4. Pantea Vaziri, Allianz

Breakout B: United States Regulatory Update

  • State Attorney General Update
  • New state regulatory frameworks
  • Rival common practices and standards
  1. Dave Navetta (M), Cooley LLP
  2. Ryan Kriger, Office of the Attorney General of Vermont
  3. Travis LeBlanc, Cooley LLP
  4. Timothy Murphy, Pennsylvania Office of the Attorney General

Breakout C: Cybersecurity Frameworks: NIST 101

  • NIST Definitions and effective risk management
  • Five Categories in NIST
  • Critical activites and metrics
  • Tools and services
  • Tracking results
  1. Drew Walter (M), Ascot Group
  2. Matt Barrett, Cyber ESI
  3. Robert Olsen, Ankura
  4. Jon Schoonmaker, Data Risk Reduction, LLC
10:45 AM — 11:15 AM
11:15 AM — 12:15 PM

Breakout A: Cyber Risk Quantification

  • The impact of cyber risk quantification to the growth of the insurance market
  • Current approaches--the strengths and weaknesses
  • Lessons from other types of risk
  • Utilization of techniques such as Machine Learning and AI
  • End goals of cyber risk quantification techniques
  1. Julie Eichenseer (M), Guidewire
  2. Peter Armstrong, Munich Re
  3. Thomas Harvey, Moody's RMS
  4. Kara Owens, Markel
  5. Matthew Silley, CyberCube Analytics

Breakout B: Class Action Certifications

  • Overview of class action law and application to cybersecurity litigation
  • Recent trends
  • Role and importance of expert testimony
  • Practical tips for companies, defense counsel and plaintiff’s counsel
  1. Christina Terplan (M), Atheria Law PC
  2. Doug Meal, Orrick
  3. James Pizzirusso, Hausfeld

Breakout C: Bug Bounty Programs

  • Definitions & development of this industry
  • Setting standards and payouts
  • Legal exposures
  • Case Study: Reporting a vulnerability
  • Insurance implications
  1. Ronald Raether (M), Troutman Pepper
  2. Deborah Chang, HackerOne
  3. John Farley, Gallagher
  4. Matthew Honea, Guidewire
12:15 PM — 1:45 PM

Lunch & Keynote

  • Keynote by Chris Rock, CEO of Siemonster and global hacking expert
  • Toby Merrill Award for Excellence
1:45 PM — 2:45 PM

Breakout A: Cyber and Non-Cyber: Getting Coverage Right

  • Exisiting cyber coverage approaches to bodily injury, tangible property damage, etc
  • Coverage provided by non-cyber property & casulty insurance products
  • Preferred approaches to coverage
  • Best practices for seeeking the right coverage
  1. Nick Economidis (M), Crum & Forster
  2. Gail Arkin, Berkley Cyber Risk Solutions
  3. Kimberly Horn, Palo Alto Networks Unit 42
  4. Robert Parisi, Munich Re

Breakout B: GDPR: A Year in Review

  • GDPR: Report on regulatory actions
  • How are US companies preparing
  • Other regulatory changes
  • Opportunities and challenges for vendors
  1. Jennifer Coughlin (M), Mullen Coughlin LLC
  2. Ian Birdsey, Clyde & Co LLP
  3. Michael Bruemmer, Experian
  4. Ryan Kriger, Office of the Attorney General of Vermont
  5. Lauren Winchester, Corvus Insurance

Breakout C: MS Office 365 Security Issues

  • Threats and vulnerabilities
  • Problems incorporating into existing policies/tech stack
  • Enhancing security and reducing frequency of compromises
  • Investigation and remediation
  • Limiting exposure in a breach
  1. David Rock (M), Trium Cyber
  2. Devon Ackerman, Kroll
  3. David Nides, KPMG
  4. Dom Paluzzi, McDonald Hopkins
2:45 PM — 3:45 PM

Breakout A: Cyber War & Terrorism

  • Territorial consideration
  • Nature of state sponsored attacks
  • Challenges in attribution
  • Coverage provisons
  1. Andrew Lea (M), CNA
  2. Raveem Ismail, ASR Re
  3. Christopher Keegan, Brown & Brown
  4. Jack Koons, Unisys
  5. Josh Ladeau, Aspen Insurance

Breakout B: Sector Risk: Healthcare

  • Cyber crime and its effect on healthcare industry
  • Evolution of Coverage
  • Reputational Harm
  • Claims handling
  1. Kimberly Holmes (M), Perez Morris
  2. James Burns, CFC
  3. Mark Eggelston, Health Partners Plans
  4. Cinthia Granados Motley, Dykema Gossett PLLC
  5. Steve Timmerman, RedSeal

Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response

  • Leveraging traditional methods of data identification in incident response
  • Enhancing cyber investigations through machine learning and advanced analytics
  • Efficiencies gained from using traditional e-discovery techniques
  • Case studies
  1. Gregory Bautista (M), Mullen Coughlin LLC
  2. Larry Brown, Epiq Global
  3. Deborah Hirschorn, Lockton Companies
  4. Nathan Little, Tetra Defense
  5. Carolyn Purwin Ryan, Mullen Coughlin LLC
3:45 PM — 4:15 PM
4:15 PM — 5:00 PM

Forensics War Stories: Cyber Fraud Hunt Operations

  • Ransomware
  • Business Email Compromise
  • Insider Threat
  1. Robert Rosenzweig (M), Risk Strategies
  2. Jarrett Kolthoff, SpearTip
  3. Michael Lotas, Arete
  4. Andrew Obuchowski, Charles River Associates
5:00 PM — 6:30 PM

Day 3: Friday, June 14

7:00 AM — 8:00 AM
8:00 AM — 9:00 AM

Public-Private Sector Threat Intelligence

  • Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA)
  • Importance of threat actor identification and attribution
  • Threat Intelligence technology and methods
  1. Vinny Sakore (M), Arete
  2. Luke Emrich, Tetra Defense
  3. Richard Goldberg, Lewis Brisbois LLP
  4. Ryan Leszczynski, FBI
  5. Daniel Tobok, CYPFER
9:00 AM — 10:00 AM

Breakout A: Ransomware: Pay or No Pay?

  • Why Not?
    • Law enforcement says, "Don't do it! It only encourages crime."
    • You will be branded as a repeatable target
    • You might not get your data back
  • Then again, maybe you should
    • Cyber Policies might cover this!
    • Quicker and cheaper than fighting it
    • Might be your only option
  1. Elizabeth Dill (M), Lewis Brisbois
  2. Anthony Dolce, The Hartford
  3. Winston Krone, Kivu
  4. Ben Stone, FBI

Breakout B: Sector Risk: Construction

  • Challenges of underwriting
  • Unique vulnerabilities
  • Cost of policies
  • Regulatory oversight
  1. Eric Stern (M), Kaufman Dolowich Voluck
  2. , Optio
  3. Doug Clare, FICO
  4. Adam Cottini, CrowdStrike
  5. Souwei Ford, WTW

Breakout C: ILS: Finding the Cyber Comfort Zone

  • Challenges and opportunities
  • Barriers to entry
  • Why ILW are gaining traction
  • What future cyber risks will propel action by the ILS?
  1. Anthony Cordonnier (M), Guy Carpenter
  2. Ari Chatterjee, Envelop RIsk
  3. David Kaplon, BAM
  4. Ian Newman, Gallagher Re
10:00 AM — 10:30 AM
10:30 AM — 11:30 AM

Breakout A: Demystifying Insurer Claims Models

  • Understand the different methods for placing business in London
  • Claims authority & agreement parties
  • Respective approaches on accessesing services under the policy
  • Biggest area of coverage disputes
  • How to ensure a positive claim experience
  1. Dan Burke (M), Woodruff Sawyer
  2. Lyndsey Bauer, Paragon International Insurance Brokers Ltd
  3. Jamie Bouloux, EmergIn Risk
  4. Tony Kriesel, Hiscox London Market
  5. Mike Schmitt, Tarian Underwriting

Breakout B: Biometrics

  • What is biometric information?
  • How / why is it collected and used?
  • Technology that collects biometric information
  • Biometric privacy liability landscape and class action lawsuits
  • Employment Practices Liability (EPL) and coverage issues
  • Compliance with biometric privacy laws
  1. Shannon Groeber (M), CFC
  2. Evan Fenaroli, Philadelphia Insurance Companies
  3. Doug Howard, Pondurance
  4. Melissa Siebert, Cozen O'Connor

Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity

  • DOJ Cyber Guidance updates
  • Dos and Don'ts of monitoring your network
  • How can the DOJ and FBI support victims of cyber attacks
  • Lessons learned
  1. Adam Saltzman (M), Buchanan Ingersoll & Rooney PC
  2. Leonard Bailey, DOJ
  3. Sam Rubin, Crypsis Group
  4. Ben Stone, FBI
  5. Joseph Swanson, Carlton Fields
11:30 AM — 12:15 PM


  • Coverage and claims
  • Modeling aggregation
  • Silent Cyber
  • Clash coverage
  1. Noel Pearman (M), AXA XL
  2. Patrick Bousfield, Lockton Re
  3. Gina Pilla, Arch Re
  4. Matthew Prevost, Chubb
  5. Joshua Pyle, CyberCube Analytics

© 2024 NetDiligence All Rights Reserved.