P.O. Box 204
Gladwyne, PA 19035
610.896.9715
AGENDA
Pre-Summit Events: Wednesday, June 24
Cyber Smart
- Paige Hanson (M), NortonLifeLock
- Jim Stickley, Stickley on Security
Day 1: Tuesday, June 30
Fireside Chat: State of the Market
- John Coletti (M), Coalition Inc.
- Nick Economidis, Crum & Forster
- Shannon Groeber, CFC
- Dan Trueman, CFC
Claims and Losses
- A Preview of the 2020 Findings of the NetDiligence Claims Study
- Trends and Costs
- Non-Affirmative Claims on the Rise
- Threats of Aggregation
- Top Policyholder Mistakes That Drive Up Costs
- Simon Oddy (M), Baker Tilly
- Jennifer Coughlin, Mullen Coughlin LLC
- Mark Greisiger, NetDiligence
- Joe Niemczyk, Markel
- Marissa Olsen, Aspen Insurance
What is Remedy and What is Improvement?
- Disagreement Between Carrier and Forensics
- Betterment Coverage
- CCPA "Cure"
- Simply Fending Off Lawsuits v. Better Security Posture
- John Farley (M), Gallagher
- Sean Curran, West Monroe Partners
- Tim Francis, Liberty Mututal Insurance
- Ronald Raether, Troutman Pepper
Cyber War and Terrorism
- Territorial Consideration
- Nature of State Sponsored Attacks
- Challenges in Attribution
- Coverage Provisons
- Erica Davis (M), Guy Carpenter
- Cyrus Delarami, Munich Re
- Wendy Peters, WTW
- Matthew Prevost, Chubb
- Keith Wojcieszek, Kroll
Non-Affirmative Cyber
- Definitions
- Non-Affirmative Impact in Non-Cyber Lines
- Coverage Considerations
- Product Development and Solutions
- Robert Parisi (M), Munich Re
- Scott Godes, Barnes & Thornburg LLP
- Michael Hauner, Munich Re
- Max Perkins, Spektrum Labs
Systemic Risk & Aggregation
- Discussion of Different Models, Modeling Approach, and Intended Use Cases
- Interpreting Results & Using Modeling Insights
- Accounting for New Exposures, Fines & Penalties, Ransomware Aggregation
- Richard DePiero (M), Sompo
- Kelly Castriotta, Markel
- Yakir Golan, Kovrr
- Danielle Smith, Moody's RMS
- Emma Watkins, Lloyd's
Day 2: Wednesday, July 1
Evolution of Ransomware Claims
- Trends: Frequency & Costs
- Impact of Covid-19
- Coverage
- Response: Negotiations and Payment
- Potential BI Losses if No-Pay
- Richard Goldberg (M), Lewis Brisbois LLP
- Ben Auton, SpearTip
- Kimberly Horn, Palo Alto Networks Unit 42
- Bill Siegel, Coveware
- Matthew Webb, Howden Re
Business Email Compromise and Wire Fraud
- Different Types of Wire Fraud: Social Engineering and Email Hacking
- Types and Ramifications of Social Engineering
- Types and Ramifications of Email Hacking
- Costs Associated with Social Engineering and Hacking
- Daniel Tobok (M), CYPFER
- Matt Gayford, Crypsis Group
- Erika Nelson, Allied World
- Stephen Ramey, IronGate Security
- Karen Painter Randall, Connell Foley LLP
SME: Moving to a Pro-Active World
- How are Placements Done
- Assessing the SME
- Efficiencies
- Striving to Differentiate
- Role of Insure Tech & the Investor Perspective
- Drew Walter (M), Ascot Group
- Sam Kassoumeh, SecurityScorecard
- Robert Rosenzweig, Risk Strategies
- Lauren Tennant Pollock, AXA XL
Wrongful Use and Inadequate Disclosure
- Hazards of Insuring Deliberate Business Practices that Run Afoul of New Regulations
- Rewording Coverage to Avoid Expanded Exposures
- Pricing for Expanded Exposures
- Impact on Profitablity by Next Wave of Class Actions and Regulatory Investigations
- Mark Mao (M), Boies Schiller Flexner LLP
- Laurie Kamaiko, Saul Ewing LLP
- Christopher Keegan, Brown & Brown
- Richard Sheridan, Berkley Cyber Risk Solutions
- John Yanchunis, Morgan & Morgan
Tricky Breaches: Managed Service Providers
- Duty of Care
- Forensics Complications
- Downstream Implications
- Conflicts Between Carriers
- Issues of Subrogation
- Stu Panensky (M), Pierson Ferdinand LLP
- Meghan Hannes, K2 Cyber
- Brendan Kelley, CNA
- Nathan Little, Tetra Defense
- David Walton, Cozen O'Connor
Day 3: Tuesday, July 7
Building A Compliance Program Without Breaking the Bank
- Sources to Define a Reasonable Cybersecurity Program
- Organizationalizing the Mitigation of Internal and External Risks
- Managing Risk in the Data Flow
- Training and the USE of MSP Security Services
- Joshua Mooney (M), Kennedys
- Steve Greenawalt, CYBIR
- Elizabeth Hinkle, 2U
- Kerry Manaster, Cloud Security Alliance
What is Reasonable Cyber Security?
- Terms and Definitons
- Various Standards of Reasonableness and Duty of Care
- Risk-Based Analysis and Best Practices
- Communicating to and Working with the Policyholder
- Andrew Maher (M), AXIS
- Chris Cronin, HALOCK Security Labs
- Doug Meal, Boston College Law School
- Timothy Murphy, Pennsylvania Office of the Attorney General
Digital Risk Management
- Trends Impacting Digital Risk Management
- Challenges Facing the Policyholder
- Supporting Better Digital Risk Management
- Future Expectations
- Kara Owens (M), Markel
- Nick Graf, CNA
- Sarah Kahler, RSA
- Andreas Kaltsounis, BakerHostetler
Day 4: Tuesday, July 21
Predicting a Breach
- Examination of Forms
- Questions Asked v Their Actual Value in Assessment
- Can Scoring Help?
- Spencer Timmel (M), Safety National
- Manish Karir, SignetRisk
- Tim Nunziata, Nationwide
- Payal Patel, Marsh McLennan
- James Perry, CrowdStrike
Cyber Claims Handling Best Practices
- Pre-Incident Preparation
- Initial Incident Response
- Effective Handling of a Ransomware Event
- Cyber Business interruption
- Tony Kriesel (M), Hiscox London Market
- Harriet Bateman, MDD Forensic Accountants
- Elizabeth Dill, Lewis Brisbois
- Matthew Tucci, Sompo
Crisis Communications, PR and Reputational Harm
- Protecting Brand & Reputation
- Balancing Legal Risk with Regulatory Disclosure Requirements
- Scrutiny on Impacted Business Post-Breach and Notification
- Insurance Coverage: Availability, Triggers, Valuation
- David Molitano (M), Berkley Cyber Risk Solutions
- Sandra Bernardo, Experian
- Kimberly Holmes, Dykema
- Jamie Singer, FTI Consulting
- Jena Valdetero, Greenberg Traurig LLP
Day 5: Tuesday, August 4
SME: Pricing and Terms
- The Evolution of Coverage for the SME
- Sub-Limited Coverage
- Assessing the SME
- Brian Thornton (M), ProWriters
- , Optio
- Jonelle Horta, Allied World
- Dave Lewison, Amwins
SME: Claims
- Loss Ratios
- Types of Losses
- Size of Losses
- Complexity
- Trends
- Christine Mapes (M), Arete
- , Tokio Marine HCC
- Jennifer Beckage, The Beckage Firm
- Tara Bodden, At-Bay
- Mary Beth Borgwing, CyberClan
SME: Risk Management
- Tools that are Cost Effective: Multi Factor Authentication, Password Managers, Employee Training, Dual Sign Off, and More.
- Risk Management Portals
- Pre-Breach and Post-Breach Services
- Micah Howser (M), NetDiligence
- Erin Burns, CRC Group
- Joshua Dann, Lodestone Security
- James Walsh, CFC
Day 6: Wednesday, September 9
Cybersecurity Trends in the Healthcare Industry
Recent Incident Response Trends in the Healthcare Industry
Personal Data Element Extraction and Reporting
Notification Requirements – Planning & Triggers
Data Mining Strategies for Health Information
- Jamie Berry (M), Integreon
- Josh Hass, Charles River Associates
- Lynn Sessions, BakerHostetler
Day 7: Thursday, September 17
Leaders Needed: Preventing the Next Big Breach
The roster of companies suffering massive cyber breaches keeps growing and the headlines are becoming commonplace. While every breach is different, there are shared elements that come up time and time again. Understanding what went wrong can help us better prepare, respond, and prevent future attacks.
Jamil Farshchi, Equifax CISO, has spent his career building industry-leading cybersecurity programs. He has seen where companies have misstepped, but he has been able to help them learn from their mistakes to become cybersecurity leaders. Jamil believes that the cybersecurity industry needs trailblazers with the willingness to have candid conversations about what works and what does not. Jamil is going to share his experiences and assessments from leading cybersecurity programs that protect some of the world’s most sensitive assets and offer actionable insights and tactics that would be beneficial to all cybersecurity experts.
- Jamil Farshchi, Equifax
Day 8: Tuesday, September 29
35 Views of Cyber Risk
Cyber risk sits at the intersection point of three different disciplines - computing, security and insurance. Each of these subjects is distinct but to properly understand cyber risk you need to master all three. This presentation looks at cyber risk from all angles, reframing familiar concepts in novel ways using theory from these and many other diverse disciplines such as economics and biology.
- John Donald, AXIS
Reinsurance Market Conditions, Part 1
- Fireside Chat on the State of the Reinsurance Market
- Pascal Millaire (M), CyberCube
- Stefan Golling, Munich Re
Reinsurance Market Conditions, Part 2
- Supply and Demand of Reinsurance and Retro
- Dan Burke (M), Woodruff Sawyer
- Catherine Mulligan, Aon
Reinsurance & Retro Structures, Part 1
Fireside Chat on Cyber Reinsurance Structures and the Drivers of Supply and Capital Sources
- Pascal Millaire (M), CyberCube
- Albert Benchimol, AXIS
Reinsurance & Retro Structures, Part 2
- Cyber Reinsurance Structures
- How Are Deals Being Placed
- Unlocking ILS Capital Supply
- Siobhan O'Brien (M), Guy Carpenter
- Adam Szakmary, Hiscox Re
- Darren Toh, Nephila Capital
- Edouard von Herberstein, Spectra
Modeling: The Key to Unlocking Capital, Part 1
A Fireside Chat on the importance of modeling in cyber insurance and a discussion of strategic business use cases.
- Pascal Millaire (M), CyberCube
- Sean Ringstead, Chubb
Modeling: The Key to Unlocking Capital, Part 2
- Model Development
- Strategic Planning for Reinsurers
- Catastrophic Loss Examples
- Brittany Baker (M), CyberCube Analytics
- Simon Cartagena, SCOR
- Anthony Cordonnier, Guy Carpenter
- Justyna Pikinska, Gallagher Re
- Danielle Smith, Moody's RMS