Philadelphia

Sep 30 — Oct 02

AGENDA

We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Pre-Summit Events: Wednesday, June 24

12:00 PM — 1:00 PM

Cyber Smart

This live streaming event features cyber security expert, business investor, and former bank robber Jim Stickley. Hear about the risks individuals are facing on a daily basis. Find out about the latest cyber-attacks and threats that organizations are confronting and how Jim finds security flaws before the real criminals can and warns people and organizations about steps they can take to protect themselves.
  1. Paige Hanson (M), NortonLifeLock
  2. Jim Stickley, Stickley on Security

Day 1: Tuesday, June 30

9:00 AM — 10:00 AM

Fireside Chat: State of the Market

An informal conversation about current trends in the market.
  1. John Coletti (M), Coalition
  2. Nick Economidis, Crum & Forster
  3. Shannon Groeber, CFC
  4. Dan Trueman, CFC
10:00 AM — 11:00 AM

Claims and Losses

  • A Preview of the 2020 Findings of the NetDiligence Claims Study
  • Trends and Costs
  • Non-Affirmative Claims on the Rise
  • Threats of Aggregation
  • Top Policyholder Mistakes That Drive Up Costs
  1. Simon Oddy (M), Baker Tilly
  2. Jennifer Coughlin, Mullen Coughlin LLC
  3. Mark Greisiger, NetDiligence
  4. Joe Niemczyk, Markel
  5. Marissa Olsen, Aspen Insurance
11:00 AM — 12:00 PM

What is Remedy and What is Improvement?

  • Disagreement Between Carrier and Forensics
  • Betterment Coverage
  • CCPA "Cure"
  • Simply Fending Off Lawsuits v. Better Security Posture
  1. John Farley (M), Gallagher
  2. Sean Curran, West Monroe Partners
  3. Tim Francis, Travelers
  4. Ronald Raether, Troutman Pepper
12:30 PM — 1:30 PM

Cyber War and Terrorism

  • Territorial Consideration
  • Nature of State Sponsored Attacks
  • Challenges in Attribution
  • Coverage Provisons
  1. Erica Davis (M), Guy Carpenter
  2. Cyrus Delarami, Munich Re
  3. Wendy Peters, WTW
  4. Matthew Prevost, Chubb
  5. Keith Wojcieszek, Kroll
1:30 PM — 2:30 PM

Non-Affirmative Cyber

  • Definitions
  • Non-Affirmative Impact in Non-Cyber Lines
  • Coverage Considerations
  • Product Development and Solutions
  1. Robert Parisi (M), Munich Re
  2. Scott Godes, Barnes & Thornburg LLP
  3. Michael Hauner, Munich Re
  4. Max Perkins, Spektrum Labs
2:30 PM — 3:30 PM

Systemic Risk & Aggregation

  • Discussion of Different Models, Modeling Approach, and Intended Use Cases
  • Interpreting Results & Using Modeling Insights
  • Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation
  1. Richard DePiero (M), Sompo
  2. Kelly Castriotta, Markel
  3. Yakir Golan, Kovrr
  4. Danielle Smith, Moody's RMS
  5. Emma Watkins, Lloyd's

Day 2: Wednesday, July 1

10:00 AM — 11:00 AM

Evolution of Ransomware Claims

  • Trends: Frequency & Costs
  • Impact of Covid-19
  • Coverage
  • Response: Negotiations and Payment
  • Potential BI Losses if No-Pay
  1. Richard Goldberg (M), Lewis Brisbois LLP
  2. Ben Auton, SpearTip
  3. Kimberly Horn, Palo Alto Networks Unit 42
  4. Bill Siegel, Coveware
  5. Matthew Webb, Hiscox
11:00 AM — 12:00 PM

Business Email Compromise and Wire Fraud

  • Different Types of Wire Fraud: Social Engineering and Email Hacking
  • Types and Ramifications of Social Engineering
  • Types and Ramifications of Email Hacking
  • Costs Associated with Social Engineering and Hacking
  1. Daniel Tobok (M), CYPFER
  2. Matt Gayford, Crypsis Group
  3. Erika Nelson, Allied World
  4. Stephen Ramey, IronGate Security
  5. Karen Painter Randall, Connell Foley LLP
12:30 PM — 1:30 PM

SME: Moving to a Pro-Active World

  • How are Placements Done
  • Assessing the SME
  • Efficiencies
  • Striving to Differentiate
  • Role of Insure Tech & the Investor Perspective
  1. Drew Walter (M), Ascot Group
  2. Sam Kassoumeh, SecurityScorecard
  3. Robert Rosenzweig, Risk Strategies
  4. Lauren Tennant Pollock, AXA XL
1:30 PM — 2:30 PM

Wrongful Use and Inadequate Disclosure

  • Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations
  • Rewording Coverage to Avoid Expanded Exposures
  • Pricing for Expanded Exposures
  • Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations
  1. Mark Mao (M), Boies Schiller Flexner LLP
  2. Laurie Kamaiko, Saul Ewing LLP
  3. Christopher Keegan, Brown & Brown
  4. Richard Sheridan, Berkley Cyber Risk Solutions
  5. John Yanchunis, Morgan & Morgan
2:30 PM — 3:30 PM

Tricky Breaches: Managed Service Providers

  • Duty of Care
  • Forensics Complications
  • Downstream Implications
  • Conflicts Between Carriers
  • Issues of Subrogation
  1. Stu Panensky (M), Pierson Ferdinand LLP
  2. Meghan Hannes, Beazley
  3. Brendan Kelley, CNA
  4. Nathan Little, Tetra Defense
  5. David Walton, Cozen O'Connor

Day 3: Tuesday, July 7

11:00 AM — 12:00 PM

Building A Compliance Program Without Breaking the Bank

  • Sources to Define a Reasonable Cybersecurity Program
  • Organizationalizing the Mitigation of Internal and External Risks
  • Managing Risk in the Data Flow
  • Training and the USE of MSP Security Services
  1. Joshua Mooney (M), Kennedys
  2. Steve Greenawalt, CYBIR
  3. Elizabeth Hinkle, 2U
  4. Kerry Manaster, Cloud Security Alliance
12:00 PM — 1:00 PM

What is Reasonable Cyber Security?

  • Terms and Definitons
  • Various Standards of Reasonableness and Duty of Care
  • Risk-Based Analysis and Best Practices
  • Communicating to and Working with the Policyholder
  1. Andrew Maher (M), AXIS
  2. Chris Cronin, HALOCK Security Labs
  3. Doug Meal, Orrick
  4. Timothy Murphy, Pennsylvania Office of the Attorney General
1:00 PM — 2:00 PM

Digital Risk Management

  • Trends Impacting Digital Risk Management
  • Challenges Facing the Policyholder
  • Supporting Better Digital Risk Management
  • Future Expectations
  1. Kara Owens (M), Markel
  2. Nick Graf, CNA
  3. Sarah Kahler, RSA
  4. Andreas Kaltsounis, BakerHostetler

Day 4: Tuesday, July 21

11:00 AM — 12:00 PM

Predicting a Breach

  • Examination of Forms
  • Questions Asked v Their Actual Value in Assessment
  • Can Scoring Help?
  1. Spencer Timmel (M), Safety National
  2. Manish Karir, SignetRisk
  3. Tim Nunziata, Nationwide
  4. Payal Patel, Marsh McLennan
  5. James Perry, CrowdStrike
12:00 PM — 1:00 PM

Cyber Claims Handling Best Practices

  • Pre-Incident Preparation
  • Initial Incident Response
  • Effective Handling of a Ransomware Event
  • Cyber Business interruption
  1. Tony Kriesel (M), Hiscox London Market
  2. Harriet Bateman, Baker Tilly
  3. Elizabeth Dill, Lewis Brisbois
  4. Matthew Tucci, Sompo
1:00 PM — 2:00 PM

Crisis Communications, PR and Reputational Harm

  • Protecting Brand & Reputation
  • Balancing Legal Risk with Regulatory Disclosure Requirements
  • Scrutiny on Impacted Business Post-Breach and Notification
  • Insurance Coverage: Availability, Triggers, Valuation
  1. David Molitano (M), Berkley Cyber Risk Solutions
  2. Sandra Bernardo, Experian
  3. Kimberly Holmes, Dykema
  4. Jamie Singer, FTI Consulting
  5. Jena Valdetero, Greenberg Traurig LLP

Day 5: Tuesday, August 4

11:00 AM — 12:00 PM

SME: Pricing and Terms

  • The Evolution of Coverage for the SME
  • Sub-Limited Coverage
  • Assessing the SME
  1. Brian Thornton (M), ProWriters
  2. , Optio
  3. Jonelle Horta, Allied World
  4. Dave Lewison, Amwins
12:00 PM — 1:00 PM

SME: Claims

  • Loss Ratios
  • Types of Losses
  • Size of Losses
  • Complexity
  • Trends
  1. Christine Mapes (M), Arete
  2. , Tokio Marine HCC
  3. Jennifer Beckage, The Beckage Firm
  4. Tara Bodden, At-Bay
  5. Mary Beth Borgwing, CyberClan
1:00 PM — 2:00 PM

SME: Risk Management

  • Tools that are Cost Effective: Multi Factor Authentication, Password Managers, Employee Training, Dual Sign Off, and More.
  • Risk Management Portals
  • Pre-Breach and Post-Breach Services    
  1. Micah Howser (M), NetDiligence
  2. Erin Burns, CRC Group | INSUREtrust
  3. Joshua Dann, Lodestone Security
  4. James Walsh, CFC

Day 6: Wednesday, September 9

11:00 AM — 12:00 PM

Cybersecurity Trends in the Healthcare Industry

Recent Incident Response Trends in the Healthcare Industry

Personal Data Element Extraction and Reporting

Notification Requirements – Planning & Triggers

Data Mining Strategies for Health Information

  1. Jamie Berry (M), Integreon
  2. Josh Hass, Charles River Associates
  3. Lynn Sessions, BakerHostetler

Day 7: Thursday, September 17

12:00 PM — 1:00 PM

Leaders Needed: Preventing the Next Big Breach

The roster of companies suffering massive cyber breaches keeps growing and the headlines are becoming commonplace. While every breach is different, there are shared elements that come up time and time again. Understanding what went wrong can help us better prepare, respond, and prevent future attacks.

Jamil Farshchi, Equifax CISO, has spent his career building industry-leading cybersecurity programs. He has seen where companies have misstepped, but he has been able to help them learn from their mistakes to become cybersecurity leaders. Jamil believes that the cybersecurity industry needs trailblazers with the willingness to have candid conversations about what works and what does not.  Jamil is going to share his experiences and assessments from leading cybersecurity programs that protect some of the world’s most sensitive assets and offer actionable insights and tactics that would be beneficial to all cybersecurity experts.

  1. Jamil Farshchi, Equifax

Day 8: Tuesday, September 29

10:00 AM — 11:00 AM

35 Views of Cyber Risk

Cyber risk sits at the intersection point of three different disciplines - computing, security and insurance. Each of these subjects is distinct but to properly understand cyber risk you need to master all three. This presentation looks at cyber risk from all angles, reframing familiar concepts in novel ways using theory from these and many other diverse disciplines such as economics and biology. 

  1. John Donald, AXIS
11:00 AM — 11:15 AM

Reinsurance Market Conditions, Part 1

  • Fireside Chat on the State of the Reinsurance Market 
  1. Pascal Millaire (M), CyberCube
  2. Stefan Golling, Munich Re
11:15 AM — 12:00 PM

Reinsurance Market Conditions, Part 2

  • Supply and Demand of Reinsurance and Retro
  1. Dan Burke (M), Woodruff Sawyer
  2. Catherine Mulligan, Aon
12:00 PM — 12:15 PM

Reinsurance & Retro Structures, Part 1

Fireside Chat on Cyber Reinsurance Structures and the Drivers of Supply and Capital Sources

  1. Pascal Millaire (M), CyberCube
  2. Albert Benchimol, AXIS
12:15 PM — 1:00 PM

Reinsurance & Retro Structures, Part 2

  • Cyber Reinsurance Structures
  • How Are Deals Being Placed
  • Unlocking ILS Capital Supply
  1. Siobhan O'Brien (M), Guy Carpenter
  2. Adam Szakmary, Hiscox Re
  3. Darren Toh, Nephila Capital
  4. Edouard von Herberstein, Spectra
1:00 PM — 1:15 PM

Modeling: The Key to Unlocking Capital, Part 1

A Fireside Chat on the importance of modeling in cyber insurance and a discussion of strategic business use cases.

  1. Pascal Millaire (M), CyberCube
  2. Sean Ringstead, Chubb
1:15 PM — 2:00 PM

Modeling: The Key to Unlocking Capital, Part 2

  • Model Development
  • Strategic Planning for Reinsurers
  • Catastrophic Loss Examples
  1. Brittany Baker (M), CyberCube Analytics
  2. Simon Cartagena, SCOR
  3. Anthony Cordonnier, Guy Carpenter
  4. Justyna Pikinska, Gallagher Re
  5. Danielle Smith, Moody's RMS

© 2024 NetDiligence All Rights Reserved.