Philadelphia

Sep 30 — Oct 02

AGENDA

We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Day 1: Wednesday, June 1

12:00 PM — 2:00 PM

Women In Cyber Luncheon Sponsored By Saul Ewing and Crum & Forster

Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! 

We look forward to hearing our keynote speaker, Sherri Davidoff, the CEO of LMG Security 

Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.

  1. Sherri Davidoff, LMG Security
  2. Laurie Kamaiko, Saul Ewing LLP
  3. Leigh McMullan, Crum & Forster
3:00 PM — 4:30 PM

Advanced Seminar: Cyber War & Terrorism

In this two-part panel, we'll examine legal and coverage issues - first in theory, then in practice. Part one looks at legal theory: international law and relevant definitions, case law, and burden of proof. Part two turns to practical considerations: cyber war vs. terrorism, coverage options and solutions, and the role of IFTRIP (The International Forum of Terrorism Risk (Re)Insurance Pools). 

  1. Mark Camillo (M), CyberAcuView
  2. Jon Bateman, Carnegie Endowment for International Peace
  3. Erica Davis, Guy Carpenter
  4. Thomas Johansmeyer, Verisk
  5. Jason Krauss, WTW
  6. Annamaria Landaverde , Unaffiliated
  7. Matthew Prevost, Chubb
  8. Tamara Snowdon, Marsh
  9. Vince Vitkowsky, Seiger Gfeller Laurie LLP

Roundtable: Ransomware Advisory Group

Because ransomware represents a costly business interruption and data breach threat to both insurers and their policyholders, NetDiligence created a Cyber Insurance Ransomware Advisory Group. The senior managers and subject matter experts who participate as members of the Cyber Insurance Ransomware Advisory Group freely contribute their time and resources to help us bring timely and useful ransomware information to the greater cyber community. Join us for this roundtable discussion and learn about the evolving ransomware landscape and attack vectors/methods from the world’s most prominent cyber forensics and data breach remediation firms.  Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.

  1. Sherri Davidoff (M), LMG Security
  2. Todd Doss, Ankura
  3. Evgueni Erchov, Arete
  4. Gabriel Gomez, Tracepoint
  5. Billy Gouveia, Surefire Cyber
  6. Nathan Little, Tetra Defense
  7. Matthew McCabe, Guy Carpenter

Workshop: Interactive Business Interruption Scenario

This interactive workshop revolves around a simulated ransomware attack.  As the situation unfolds, the company's incident response team--and by extent, the participants--will ask questions and make decisions regarding the system restoration, negotiation, payment, legal ramifications, notification, public relations, and more.  Each time new information is revealed, there will be a break in the action for live table discussion.  Following the discussions, participants will help guide the company's next actions by making selections on their mobile phones.

  1. Mikel Pearce (M), CyberClan
  2. Patrick Bourk, NetDiligence
  3. Stephen Boyce, Magnet Forensics
  4. Britt Eilhardt, Brown & Brown
  5. Aideen Gaffney, Epiq
  6. Todd Hindman, ZeroFox
  7. Evan Roberts, FTI Consulting
  8. Anna Rudawski, Norton Rose Fulbright LLP
  9. Violet Sullivan, Redpoint Cybersecurity
9:00 PM — 11:00 PM

Late Nite @ NetDiligence Sponsored by Crum & Forster


  1. Brian Braden (M), Crum & Forster
  2. Lori Bailey, AXIS
  3. Beth Diamond, Beazley
  4. Shannon Groeber, CFC
  5. Jim Leonard, Kroll
  6. William Pitt, Conning
  7. Matthew Shanks, Amwins

Day 2: Thursday, June 2

8:30 AM — 9:30 PM

Opening Remarks & Keynote Address

Opening Remarks and Welcome

Keynote Address by Tony Kuczinski, President & CEO, Munich Re US Holding

  1. Mark Greisiger, NetDiligence
  2. Tony Kuczinski, Munich Re
  3. Heather Osborne, NetDiligence
9:30 AM — 10:20 AM

Plenary Session: 2022 Claims & Losses Update

  • The 2021 NetDiligence Cyber Claims Study
  • Current 2022 Data
  • Report from the Trenches: Carrier & Breach Coach
  • Future Predictions

  1. Jennifer Coughlin (M), Mullen Coughlin LLC
  2. Gwenn Cujdik, AXA XL
  3. Mark Greisiger, NetDiligence
  4. Scott Tenenbaum, AXIS
  5. Matthew Tucci, Sompo
10:50 AM — 11:40 AM

Breakout A: State of the Market: Smells Like Teen Spirit

Long-Term Viability & Sustainability
Detecting the Weak Links: How intrusive can we be?
Pricing & Controls
Need for Security Standards
Innovation

  1. Robert Rosenzweig (M), Risk Strategies
  2. Alexandra Bretschneider, Johnson Kendall Johnson
  3. Jacob Ingerslev, Tokio Marine HCC-CPLG
  4. Payal Patel, Marsh McLennan
  5. Eric Seyfried, AXIS

Breakout B: U.S. Regulatory Update: View from the States

  • Law Enforcement Infrastructure
  • Cross-Agency Connections
  • Coordination & Themed Investigation Model
  • Working with Third Party Vendors
  • Building a Safe & Secure Digital Environment
  • Circular Approach to Working with At-Risk Groups

  1. Anjali Das (M), Wilson Elser
  2. Gene Fishel, Commonwealth of Virginia Office of Attorney General
  3. Michele Lucan, Connecticut Attorney General's Office
  4. Timothy Murphy, Pennsylvania Office of the Attorney General

Breakout C: CISO Round-Up: What Keeps You Up at Night?

  • Technological Focus on Current Threats & Priorities
  • Technology as a Tool & as a Risk
  • Governance & Compliance Within Their Role
  • Integrating Risk Management Into the Insurance Process


  1. Doug Howard (M), Pondurance
  2. Jamil Farshchi, Equifax
  3. Taylor Lehmann, Google
  4. Hussein Syed, RWJBarnabas Health
11:40 AM — 12:30 PM

Breakout A: Getting Renewal Ready

  • Understanding Real Digital Risk
  • Inside-Out Analysis
  • Broadening the Strategy
  • Understanding the Contents of the Digital Asset
  • Quantifying the Risk & Accounting for It
  1. Robert Parisi (M), Munich Re
  2. John Beers, MOXFIVE
  3. Christiaan Durdaller, CRC Group | INSUREtrust
  4. Mike Karbassi, Corvus Insurance
  5. Reuben Vandeventer, SecondSight

Breakout B: What Really Happens When You Negotiate with a Hacker: An Insider’s View

In this session we will explore the mysterious world of ransomware extortion negotiations. You will hear directly from a professional ransomware extortion negotiator and dive into the multiple issues an organization may need to navigate in the facilitation of extortion payments. How do you get immediate access to bitcoin? Do hackers negotiate, and by how much? Do they return your data if you pay? How long does it take to get your data back and recover? Do they carry out their threats to destroy or publicize your sensitive data if you don’t pay? What role does law enforcement play? What Federal laws need to be complied with? How does cyber insurance play a part in all of this?

  1. John Farley (M), Gallagher
  2. Joseph Bruemmer, BakerHostetler
  3. Evgueni Erchov, Arete

Breakout C: Beyond the Arrest: Law Enforcement Roundtable

  • Global Cyber Threatscape
  • Role of US Cyber Law Enforcement & Intelligence Overseas
  • Unique Characteristics of US-Canada Cyber
  • Importance of Unifying Efforts to Defend Against Cyber Threats
  • International Cooperation--Public & Private
  1. Michael Bruemmer (M), Experian
  2. Brian Abellera, US Federal Bureau of Investigation
  3. Eric Adams, U.S. Secret Service
  4. Jason Conboy, US Department of Homeland Security
  5. Matthew Robinson, Royal Canadian Mounted Police
12:30 PM — 1:45 PM

Lunch Sponsored by Sophos

Presentation of the Annual Toby Merrill Awards

"The FBI's Role in Incident Response," a Fireside Chat with Bryan Vorndran, Assistant Director, Cyber Division, FBI

  1. Guillermo Christensen, K&L Gates
  2. Bryan Vorndran, US Federal Bureau of Investigation
1:45 PM — 2:35 PM

Breakout A: Security Standards: What We Have, What We Need

  • Need for Relevant, Actionable Information
  • What are Essential Practices
  • Insider Threat Visibility
  • Do NIST, ISO, WISP, etc. fall short?
  • Disparity Between Meeting a Requirement and Actually Being Secure
  1. Aubrey Weaver (M), Constangy, Brooks, Smith & Prophete, LLP
  2. Brook Dutcher, Allied World
  3. Keith Novak, Kroll
  4. Michael Wilkinson, Avertium
  5. Nathanael Williams, Fox Rothschild LLP

Breakout B: Fines & Penalties

  • Global Trends in Cyber Risk Fines & Penalties
  • Insurability & Coverage
  • Applicability & Challenges Around Insurance
  • Valuation
  • Future Predictions
  1. Judy Selby (M), Selby Strategies
  2. Peter Halprin, Pasich LLP
  3. Michael Phillips, CFC
  4. Bernard Regan, Baker Tilly Virchow Krause, LLP
  5. Harry Valetk, Loeb & Loeb LLP

Breakout C: Small Business, Big Security: How Small & Medium Size Business Can Prepare for Incidents

  • Cyber Challenges for the Small & Medium Sized Business
  • Defensive & Offensive Tactics
  • Building Resilience
  • Role of the Managed Service Provider
  1. John Menefee (M), Travelers
  2. Chris Martino, Arete
  3. Caroline Thompson, Cowbell Cyber
  4. Marcin Weryk, Coalition
2:35 PM — 3:25 PM

Breakout A: The Path to Lower Loss Ratios: Effective Controls & Inside Visibility

  • Roles & Capabilities of Insurers & Brokers in Assessing Technical Cyber Risk
  • How Technical Cyber Risk Assessment Impact Policy Terms, Premiums & Availability of Cyber Insurance
  • Is the Industry Evolving to Embrace to Embrace Better Data & Enforce Pre-Event Controls
  • How Relationships Between Insurers, Policyholders & Cybersecurity Providers Enable Effective Controls & Internal Visibility 
  1. Erin Kenneally (M), SentinelOne
  2. Olga Livingston, Cybersecurity and Infrastructure Security Agency
  3. Benjamin Mancuso, Ascot Group
  4. Claudia Piccirilli, WTW
  5. Catherine Rudow, Everest Re

Breakout B: FinTech Risks: Cyber and Tech E&O

  • What is Decentralized Finance (DeFi) 
  • Blending Traditional FI (Financial Institutions) and Digital Assets 
  • Types of FinTech services within B2B and B2C
  • Common Tech Platforms Include SaaS, CaaS
  • Differences in Regulation
  • Underwriting Challenges for Non-Standard Solutions
  • End-to-End Safekeeping of Digital Assets
  • Forensic Accounting Process to Determine BI Loss

  1. Neeraj Sahni (M), Aon
  2. Nick Economidis, Crum & Forster
  3. Lisa Morris, MDD Forensic Accountants
  4. Stephen Palley, Anderson Kill
  5. Mayur Patel, Munich Re

Breakout C: The Evolving Roles of Claims Professionals & Breach Coaches in Incident Response

  • Common Roles for Claims Professionals, Brokers & Breach Coaches
  • How are these roles evolving?
  • Working Together to Reduce Costs & Manage Claims Efficiently
  • Impact on Insureds & View of the Broker
  • More to the Breach Coach than Just "Privilege?"
  • Moving to Task-Based Fee Pricing or Flat Fees
  1. Shawn Tuma (M), Spencer Fane LLP
  2. Lisa Jaffee, Hiscox
  3. Sadia Mirza, Troutman Pepper
  4. Natalia Santiago, McGriff, Seibels & Williams
  5. Michael Sarlo, HaystackID
3:55 PM — 4:45 PM

Plenary: Cyber Insurance: Leveraging the Trillion Dollar Opportunity

  • Supply of Capacity & Why is it Fundamentally Limited
  • Drivers of Demand & Quantifying Demand Growth
  • Bridging the Supply/Demand Growth
  • Capitalizing on the Opportunity
  • Creating Accessibility to Cyber Insurance for All Organizations
  1. Kelly Castriotta (M), Markel
  2. John Butler, CNA
  3. Gordon Malin, Elpha Secure
  4. Grace Seigle, Gallagher Re
  5. John Seo, Fermat Capital Management LLC

Day 3: Friday, June 3

8:00 AM — 9:00 AM
9:00 AM — 9:50 AM

Breakout A: The Evolution of Ransomware & Its Impact on OFAC Compliance

  • Applying OFAC Compliance Lessons from Non-Cyber Issues to Ransomware
  • Considering "Risk Based" Compliance When Dealing with Criminals
  • Application of OFAC's 50% Rule to a Ransomware-as-a-Service Model
  • Why Threat Intelligence in this Context is More Like Attribution

  1. Matthew Leidlein (M), Digital Asset Redemption
  2. Guillermo Christensen, K&L Gates
  3. Meghan Farally, Cipriani & Werner PC
  4. Richard Sheridan, Berkley Cyber Risk Solutions
  5. James Taliento, AFTRDRK

Breakout B: Use of Analytical Tools in the Cyber Ecosystem

  • Techniques and Solutions to Gain Understanding of Cyber Exposure
  • Understanding & Responding to Critical Vulnerabilities
  • Market Modeling
  • Portfolio Modeling
  • External vs Internal Policyholder Scans
  • Monitoring Change in Environment

  1. Erin Burns (M), CRC Group | INSUREtrust
  2. John Anderson, CyberCube Analytics
  3. John Brewer, HaystackID
  4. Perry Lee, AIG
  5. Anna Sarnek, Valence Security
10:20 AM — 11:10 AM

Breakout A: Cloud Based Incident Response

  • Differences Between Traditional & Cloud-Based Incident Response
  • Threat Landscape as it Applies to the Cloud
  • Challenges with DFIR in the Cloud
  • Effective & Efficient Response to Cloud IR Matters

  1. Brian Thornton (M), ProWriters
  2. Ben Auton, SpearTip
  3. Ashlie Blanca, Palo Alto Networks Unit 42
  4. Arthur Freer, eSentire
  5. Spencer Pollock, McDonald Hopkins

Breakout B: Subrogation in Cyber Claims Related to Business Interruption & Contingent Business Interruption

  • Infrastructure and Infrastructure Adjacent Vulnerabilities
  • Service Provider Outlook at Aggregative Claims
  • Service Level Agreement Implications
  • The Use of Models & Analytics to Identify Claims Opportunistic for Subrogation
  1. Ian Bird, Guidewire
  2. Anthony Dolce, The Hartford
  3. Laurie Kamaiko, Saul Ewing LLP
  4. Bradley Vatrt, Vantage Risk
11:10 AM — 12:00 PM

Plenary: Why Talent Issues are a Bigger Threat than Ransomware

  • Talent Market Overview
  • Causes for the Shortage of Talent
  • Impact on the Industry
  • Best Practices for Acquisition, Development & Retention of Talent
  • How to Move the Industry Forward
  1. Meghan Hannes (M), Beazley
  2. Sean Hoar, Constangy, Brooks, Smith & Prophete, LLP
  3. Brian Robb, Berkshire Hathaway Specialty Insurance
  4. Karl Sharman, Forgepoint Capital
  5. Ayesha West, WTW
12:00 PM — 12:00 PM

© 2024 NetDiligence All Rights Reserved.