P.O. Box 204
Gladwyne, PA 19035
610.896.9715
AGENDA
Announcing our Keynote Speaker!
NetDiligence® is excited to announce that Chris Rock, CEO of SEIMonster and global hacking expert, will be giving the keynote address on Thursday, June 13, 2019. Chris Rock has been an active participant in the Security Industry for over 20 years working in four different banks and CEO of a penetration testing company. He is the CEO and co-founder of SIEMonster. Chris is continually researching vulnerabilities and has twice been invited to present at DEFCON, the world's largest hacking conference:
"I will kill you and birth you"
"How to overthrow a government"
Intro to Cyber
NetDiligence® invites students, interns and summer associates to spend June 13, 2019, with us at the Cyber Risk Summit. In the morning, you'll attend our groundbreaking Intro to Cyber program developed for future insurance, legal and technical security professionals. For the remainder of the day, you're invited to participate as an attendee in the main conference. This event is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at [email protected] to obtain your Discount Code.
Day 1: Wednesday, June 12
Women In Cyber Lunch
Panelists
- Shelley Ma, Coalition
Option A: Interactive Breach Scenarios Workshop (duplicate session due to popularity)
- An understanding of the more recent, and prevalent, cyber security threats
- An overview of legal, compliance and response obligations
- Strategies on dealing with hackers and media during a breach
- How to mount a response and what services and products to include
Panelists
- Andrew Liuzzi (M), Deloitte
- Ian Kelly, ZeroFox
- Bilal Malik, Stroz Friedberg
- Brian Thornton, ProWriters
- Melissa Ventrone, Clark Hill PLC
Option B: Interactive Breach Scenarios Workshop (duplicate session due to popularity)
- An understanding of the more recent, and prevalent, cyber security threats
- An overview of legal, compliance and response obligations
- Strategies on dealing with hackers and media during a breach
- How to mount a response and what services and products to include
Panelists
- Micah Howser (M), NetDiligence
- Hans Allnutt, DAC Beachcroft
- Allen Burzen, GBMS USA
- John Cleary, Polsinelli PC
- Joe Mann, Arete
- Joe Niemczyk, Markel
- Erin Walters, USI Insurance Services
Option C: Cyber Claims Handling Best Practices Workshop
- Distinguishing carriers
- Readiness of the claims unit who will actually handle a cyber claim
- Mitigating derivative risk to the policyholder and reducing cost for the insurer
- How are claims adjusted and processed
- How are vendors selected
- Coordination between lines
Panelists
- Karen Painter Randall (M), Connell Foley LLP
- Karrieann Couture, Aon
- Jason Rebholz, Corvus Insurance
- Richard Sheridan, Berkley Cyber Risk Solutions
- Jena Valdetero, Greenberg Traurig LLP
Option D: Ethics: Cyber Security & Social Engineering for Lawyers and Law Firms
- Common and Unique Risks & Vulnerabilities for Law Firms and the Data they Process
- Risk Assessment and Verification Process
- Regulatory Guidance, Privacy Obligations & ABA Opinion 483 on Cybersecurity
- Lawyer’s Professional Liability & Third Party Claims
- Internal Safeguards: Privacy Policies, Monitoring Software, Social Engineering Training
- Incident Response Planning
Panelists
- Stu Panensky (M), Pierson Ferdinand LLP
- John Barrett, BDP International, Inc
- Jennifer Beckage, The Beckage Firm
- Elissa Doroff, Mosaic Insurance
- Larry Hershman, Black Cipher Security
Day 2: Thursday, June 13
Claims and Losses Update: 2019 Trends
- A Preview of the 2019 NetDiligence® Cyber Claims Study
- Types of claims being covered
- Examination of cost
- Claims notice and claims handling
- Laurie Kamaiko (M), Saul Ewing LLP
- , Swiss Re
- Robert Flowers, Travelers
- Mark Greisiger, NetDiligence
- John Mullen, Mullen Coughlin LLC
Intro to Cyber
The Intro to Cyber program begins with keynote speakers, followed by panel discussions on the topics of Brokers & Underwriters and Security & Legal Solutions.
After the program ends, attendees are invited to participate in the main conference. This program is free for all students, but you will need a special Discount Code in order to register. Seating is limited to the first 50 students who register. If you are interested in attending this free session, please email us at [email protected] to obtain your Discount Code.
- Doug Brush, Brush Cyber
- Leslie Gravel, WTW
- George Holevas, Marsh
- Micah Howser, NetDiligence
- Anthony Koludrovic, Berkley Cyber Risk Solutions
- Georgea Mancuso, Black Marjieh & Sanford LLP
- Brookes Taney, Arete
- Ayesha West, WTW
- Madison Williamson, Hiscox
Breakout A: Non-Affirmative Cyber from 50,000 Feet
- Definitions
- Non-affirmative impact in non-cyber lines
- Coverage considerations
- Product development and solutions
- All Perils coverage
- Jon Laux (M), CyberCube Analytics
- Richard DePiero, Sompo
- Anthony Shapella, AIG
- Pantea Vaziri, Allianz
Breakout B: United States Regulatory Update
- State Attorney General Update
- New state regulatory frameworks
- Rival common practices and standards
- Dave Navetta (M), Cooley LLP
- Ryan Kriger, Office of the Attorney General of Vermont
- Travis LeBlanc, Cooley LLP
- Timothy Murphy, Pennsylvania Office of the Attorney General
Breakout C: Cybersecurity Frameworks: NIST 101
- NIST Definitions and effective risk management
- Five Categories in NIST
- Critical activites and metrics
- Tools and services
- Tracking results
- Drew Walter (M), Ascot Group
- Matt Barrett, Cyber ESI
- Robert Olsen, Ankura
- Jon Schoonmaker, Data Risk Reduction, LLC
Breakout A: Cyber Risk Quantification
- The impact of cyber risk quantification to the growth of the insurance market
- Current approaches--the strengths and weaknesses
- Lessons from other types of risk
- Utilization of techniques such as Machine Learning and AI
- End goals of cyber risk quantification techniques
- Julie Eichenseer (M), Guidewire
- Peter Armstrong, Munich Re
- Thomas Harvey, Moody's RMS
- Kara Owens, Markel
- Matthew Silley, CyberCube Analytics
Breakout B: Class Action Certifications
- Overview of class action law and application to cybersecurity litigation
- Recent trends
- Role and importance of expert testimony
- Practical tips for companies, defense counsel and plaintiff’s counsel
- Christina Terplan (M), Atheria Law
- Doug Meal, Boston College Law School
- James Pizzirusso, Hausfeld
Breakout C: Bug Bounty Programs
- Definitions & development of this industry
- Setting standards and payouts
- Legal exposures
- Case Study: Reporting a vulnerability
- Insurance implications
- Ronald Raether (M), Troutman Pepper
- Deborah Chang, HackerOne
- John Farley, Gallagher
- Matthew Honea, Guidewire
Lunch & Keynote
- Keynote by Chris Rock, CEO of Siemonster and global hacking expert
- Toby Merrill Award for Excellence
Breakout A: Cyber and Non-Cyber: Getting Coverage Right
- Exisiting cyber coverage approaches to bodily injury, tangible property damage, etc
- Coverage provided by non-cyber property & casulty insurance products
- Preferred approaches to coverage
- Best practices for seeeking the right coverage
- Nick Economidis (M), Crum & Forster
- Gail Arkin, Berkley Cyber Risk Solutions
- Kimberly Horn, Palo Alto Networks Unit 42
- Robert Parisi, Munich Re
Breakout B: GDPR: A Year in Review
- GDPR: Report on regulatory actions
- How are US companies preparing
- Other regulatory changes
- Opportunities and challenges for vendors
- Jennifer Coughlin (M), Mullen Coughlin LLC
- Ian Birdsey, Clyde & Co LLP
- Michael Bruemmer, Experian
- Ryan Kriger, Office of the Attorney General of Vermont
- Lauren Winchester, Corvus Insurance
Breakout C: MS Office 365 Security Issues
- Threats and vulnerabilities
- Problems incorporating into existing policies/tech stack
- Enhancing security and reducing frequency of compromises
- Investigation and remediation
- Limiting exposure in a breach
- David Rock (M), Trium Cyber
- Devon Ackerman, LevelBlue
- David Nides, KPMG
- Dom Paluzzi, McDonald Hopkins
Breakout A: Cyber War & Terrorism
- Territorial consideration
- Nature of state sponsored attacks
- Challenges in attribution
- Coverage provisons
- Andrew Lea (M), CNA
- Raveem Ismail, ASR Re
- Christopher Keegan, Brown & Brown
- Jack Koons, Unisys
- Josh Ladeau, Aspen Insurance
Breakout B: Sector Risk: Healthcare
- Cyber crime and its effect on healthcare industry
- Evolution of Coverage
- Reputational Harm
- Claims handling
- Kimberly Holmes (M), Dykema
- James Burns, CFC
- Mark Eggleston, Corporation Service Company.
- Cinthia Granados Motley, Dykema
- Steve Timmerman, RedSeal
Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response
- Leveraging traditional methods of data identification in incident response
- Enhancing cyber investigations through machine learning and advanced analytics
- Efficiencies gained from using traditional e-discovery techniques
- Case studies
- Gregory Bautista (M), Mullen Coughlin LLC
- Larry Brown, Epiq Global
- Deborah Hirschorn, Lockton
- Nathan Little, Tetra Defense
- Carolyn Purwin Ryan, Mullen Coughlin LLC
Forensics War Stories: Cyber Fraud Hunt Operations
- Ransomware
- Business Email Compromise
- Insider Threat
- Robert Rosenzweig (M), Risk Strategies
- Jarrett Kolthoff, SpearTip
- Michael Lotas, Arete
- Andrew Obuchowski, Charles River Associates
Day 3: Friday, June 14
Public-Private Sector Threat Intelligence
- Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA)
- Importance of threat actor identification and attribution
- Threat Intelligence technology and methods
- Vinny Sakore (M), Arete
- Luke Emrich, Surefire Cyber
- Richard Goldberg, Lewis Brisbois LLP
- Ryan Leszczynski, FBI
- Daniel Tobok, CYPFER
Breakout A: Ransomware: Pay or No Pay?
- Why Not?
- Law enforcement says, "Don't do it! It only encourages crime."
- You will be branded as a repeatable target
- You might not get your data back
- Then again, maybe you should
- Cyber Policies might cover this!
- Quicker and cheaper than fighting it
- Might be your only option
- Elizabeth Dill (M), Lewis Brisbois
- Anthony Dolce, The Hartford
- Winston Krone, Kivu
- Ben Stone, FBI
Breakout B: Sector Risk: Construction
- Challenges of underwriting
- Unique vulnerabilities
- Cost of policies
- Regulatory oversight
- Eric Stern (M), Kaufman Dolowich Voluck
- , Optio
- Doug Clare, FICO
- Adam Cottini, CrowdStrike
- Souwei Ford, WTW
Breakout C: ILS: Finding the Cyber Comfort Zone
- Challenges and opportunities
- Barriers to entry
- Why ILW are gaining traction
- What future cyber risks will propel action by the ILS?
- Anthony Cordonnier (M), Guy Carpenter
- Ari Chatterjee, Envelop RIsk
- David Kaplon, BAM
- Ian Newman, Gallagher Re
Breakout A: Demystifying Insurer Claims Models
- Understand the different methods for placing business in London
- Claims authority & agreement parties
- Respective approaches on accessesing services under the policy
- Biggest area of coverage disputes
- How to ensure a positive claim experience
- Dan Burke (M), Woodruff Sawyer
- Lyndsey Bauer, Paragon International Insurance Brokers Ltd
- Jamie Bouloux, EmergIn Risk
- Tony Kriesel, Hiscox London Market
- Mike Schmitt, Tarian Underwriting
Breakout B: Biometrics
- What is biometric information?
- How / why is it collected and used?
- Technology that collects biometric information
- Biometric privacy liability landscape and class action lawsuits
- Employment Practices Liability (EPL) and coverage issues
- Compliance with biometric privacy laws
- Shannon Groeber (M), CFC
- Evan Fenaroli, Philadelphia Insurance Companies
- Doug Howard, Pondurance
- Melissa Siebert, Cozen O'Connor
Breakout C: U.S. Department of Justice’s View on Best Practices in Cybersecurity
- DOJ Cyber Guidance updates
- Dos and Don'ts of monitoring your network
- How can the DOJ and FBI support victims of cyber attacks
- Lessons learned
- Adam Saltzman (M), Buchanan Ingersoll & Rooney PC
- Leonard Bailey, DOJ
- Sam Rubin, Crypsis Group
- Ben Stone, FBI
- Joseph Swanson, Carlton Fields
Reinsurance
- Coverage and claims
- Modeling aggregation
- Silent Cyber
- Clash coverage
- Noel Pearman (M), AXA XL
- Patrick Bousfield, Howden Re
- Gina Pilla, Arch Re
- Matthew Prevost, Chubb
- Joshua Pyle, CyberCube Analytics