Miami Beach

Feb 10 — 12

AGENDA

We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Day 1: Wednesday, May 31

12:00 PM — 2:00 PM

Women in Cyber Luncheon Sponsored by Crum & Forster and Saul Ewing

Join us for one of our favorite traditions, meet new people and reconnect with old friends as we celebrate women in our industry! 

We look forward to hearing our keynote speaker, Josephine Wolff, associate professor of cybersecurity policy at The Fletcher School of Law and Diplomacy at Tufts University. 


Sponsored by Crum & Forster and Saul Ewing Arnstein & Lehr LLP.

  1. Morissa Falk-Freedman, Crum & Forster
  2. Laurie Kamaiko, Saul Ewing LLP
  3. Josephine Wolff, Tufts University
3:00 PM — 3:45 PM

Breakout A: Ransomware Advisory Group

Learn about the evolving ransomware landscape and attack vectors/methods. Come away from this session with current sector intelligence to help develop effective policy coverage strategies and tactical policyholder due-diligence requirements in order to make cost-effective, ransomware-specific cyber insurance products available to the policyholders.

  1. Max Henderson (M), Pondurance
  2. Kayla Barker, Artic Wolf
  3. Evgueni Erchov, Arete
  4. Jonathan Rajewski, Stroz Friedberg

Breakout B: Why Cyber is More Modellable than Natural Catastrophes

  • Cyber as a Peril vs Natural Catastrophes
  • Economic & Political Motivation of Cyber vs Randomness of Natural Catastrophes
  • Digitally Housed Data vs Mineable Climate Data
  • Cyber Ecosystem as Modelable & Reversible
  1. Patrick Bousfield (M), Howden Re
  2. Ian Bird, Guidewire
  3. AJ Dharma-Wardana, Envelop Risk
  4. Daniel Palardy, Cowbell

Breakout C: Myth Busting on Effectiveness of Top Controls

  • No Silver Bullets
  • Are Underwriters Asking the Right Questions?
  • Good, Better, Best on Each Control
  • Cannot Outsource Responsibility or Liability



  1. Gordon Gray (M), Amwins
  2. James Gimbi, MOXFIVE
  3. Patrick Hassett, Vantage Risk
  4. Michael Sarlo, HaystackID
3:45 PM — 4:30 PM

Breakout A: Staying Ahead of Cyber Threats: The Power of a Threat-Informed Defense Strategy

  • Understanding the Evolving Threat Landscape
  • Integrating Threat Intelligence & MITRE ATT&CK Into Corporate Security Strategy
  • Measuring Success with a Threat-Informed Defense Strategy
  • Techniques for Proactively Identifying & Mitigating Cyber Threats



  1. Jamie Tolles (M), ZeroFox
  2. Matthew Huwyler, Comcast
  3. Tracy O'Hara, Ascot Group
  4. Stu Panensky, Pierson Ferdinand LLP

Breakout B: Navigating the Nexus: Cyber Insurance Claims and Cyber Reinsurance

  • Best Collaboration Between Cyber Reinsurance Claims & Primary Insurance Claims Professionals
  • Ensuring Data Quality that Enhances Underwriting Process & Meets the Needs of Capital Partners
  • Accelerating Data Flow to Speed Capital to Risk


  1. Joe Niemczyk (M), Markel
  2. Erin Flaherty, Guy Carpenter
  3. Gina Pilla, Arch Re
  4. Matthew Ross, Marsh McLennan Agency

Breakout C: Transforming Incident Response

  • Leading Factors Contributing to the Rise in Cyber Incidents
  • Leading Factors Contributing to the Rise in Cyber Incidents
  • Tech Enablement & Its Application in Active Insurance
  • Active Insurance Drives Resilience for Both Insurance Carrier & Policy Holder
  • Elements of Good Collaboration & Communication



  1. Lauren Winchester (M), Corvus Insurance
  2. Sadia Mirza, Troutman Pepper
  3. Joe Tarraf, Surefire Cyber
  4. Sara Trokan, Westfield Specialty

Day 2: Thursday, June 1

8:20 AM — 8:30 AM
8:30 AM — 9:00 AM

Plenary: Capital, Fuel for the Future: Opportunities and Challenges

A timely discussion around the opportunities and challenges that lie ahead for investors, insurers, reinsurers and cyber start-ups around the acquisition, creation and deployment of capital now and in the future.

  1. Eric Seyfried (M), AXIS
  2. Erica Davis, Guy Carpenter
  3. Gordon Malin, Elpha Secure
9:00 AM — 9:30 AM

Plenary: Building Resilience to Catastrophic Cyber Risk: A Federal Perspective

Building Resilience to Catastrophic Cyber Risk: The National Cybersecurity Strategy and Ongoing Assessment of a Federal Insurance Response.

A conversation with representatives from the Office of the National Cyber Director, The White House and the Federal Insurance Office, Department of Treasury.

  1. Catherine Rudow (M), Everest Re
  2. Stephanie Schmelz, Federal Insurance Office
  3. Stephen Vi�a, Office of the National Cyber Director, The White House
9:30 AM — 10:20 AM

Plenary: 2022 Claims & Losses Update

  • A Review of the 2022 NetDiligence Cyber Claims Study & Current 2023 Data
  • Report from the Trenches: Carrier and Breach Coach
  • Future Predictions


  1. Melissa Ventrone (M), Clark Hill PLC
  2. Jennifer Coughlin, Mullen Coughlin LLC
  3. Mark Giacopelli, Nationwide
  4. Mark Greisiger, NetDiligence
  5. Matthew Tucci, Sompo
10:50 AM — 11:40 AM

Breakout A: State of the Market: A Maturing Market

  • Catching Our Breath After the Hard Market
  • Long-Term Viability & Sustainability
  • Pricing & Controls
  • Innovation



  1. Shannon Groeber (M), CFC
  2. Alexandra Bretschneider, Johnson Kendall Johnson
  3. Jacob Ingerslev, Tokio Marine HCC-CPLG
  4. Jennifer Mulvihill, SecurityScorecard
  5. Peter Smith, AXIS

Breakout B: Data Privacy Litigation Update

  • Updates on BIPA Litigation
  • VPPA Litigation
  • Data Breach Litigation
  • Risk Mitigation & Avoiding Coverage Disputes



  1. Phil Yannella (M), Ballard Spahr LLP
  2. Anjali Das, Wilson Elser
  3. Cinthia Granados Motley, Dykema Gossett PLLC
  4. Melissa Siebert, Cozen O'Connor

Breakout C: The Top Data Breach Response Mistakes & How to Avoid Them

  • Attorney-Client Privilege Issues
  • Using Off-Panel Vendors
  • Claim Reporting Issues
  • Failing to Preserve Evidence
  • Communication & PR issues
  • Strained Relations with Regulators
  • Improper Response to Affected Individuals






  1. John Farley (M), Gallagher
  2. , At-Bay
  3. Katie Clark, Edelman
  4. Sean Hoar, Constangy, Brooks, Smith & Prophete, LLP
  5. Brendan Rooney, Booz Allen
11:40 AM — 12:30 PM

Breakout A: Systemic Risk

  • War
  • Infrastructure
  • "Widespread Event"
  • Government Perspective
  • Backstop
  1. Mark Camillo (M), CyberAcuView
  2. Matthew Prevost, Chubb
  3. Tamara Snowdon, Marsh
  4. Scott Stransky, Marsh McLennan
  5. Josephine Wolff, Tufts University

Breakout B: US Regulatory Update: View from the States

  • State Attorney General Update
  • New & Pending State Privacy Laws
  • Trends in Enforcement and Anticipated Enforcement
  • Approaches to Complying with Multiple State Privacy Laws



  1. Michael Bruemmer (M), Experian
  2. Kashif Chand, New Jersey Division of Law
  3. Gene Fishel, Commonwealth of Virginia Office of Attorney General
  4. Timothy Murphy, Pennsylvania Office of the Attorney General

Breakout C: Countdown to Catastrophe: How the Economics of Zero-Days Could Lead us to the Next COVID in Cyberspace

  • Origin and Current State of the Zero-day Vulnerability Marketplace
  • How Past Zero-day Attacks Have Led to Systemic Losses
  • Current Zero-Day Vulnerabilities & Attack Scenarios That Can Lead to Catastrophic Cyber Events
  • Analyzing and Responding to the Systemic and Aggregation Risks Posed by Zero-day Vulnerabilities
  • Lessons Learned from Close Call Systemic Events, Including How Many Actually Resulted in Claims




  1. Ben Goodman (M), CyRisk
  2. Dustin Childs, Trend Micro Zero Day Initiative
  3. Olga Livingston, Cybersecurity and Infrastructure Security Agency
  4. Tim Marshall, Munich Re
  5. Cassie Quaranta, Crum & Forster
12:30 PM — 1:45 PM

Lunch Sponsored by TransUnion

  • NetDiligence Toby Merrill Awards
  • Lunchtime Presentation: Partnering with the FBI and a Case Study of the ChipMixer Takedown--The FBI will provide a presentation on the importance of cyber private sector partnerships, their outreach efforts, and the InfraGard program. This will be followed by an in-depth case study of the recent international investigation into ChipMixer, a darknet cryptocurrency “mixing” service responsible for laundering more than $3 billion between 2017 and the March, 2023 takedown.
  1. Cerena Coughlin, Federal Bureau of Investigation
  2. Toby Merrill Awards Committee,
1:45 PM — 2:35 PM

Breakout A: Trouble in Paradise: What to Do if there is a Coverage Problem

  • Role of Panel Counsel when Carrier Denies Coverage or Rescinds Policy
  • Role of Broker or Claim Advocate
  • Application of Privilege in Coverage Disputes
  • Addressing Claim Adjuster Request for Information
  • Working with Outside Counsel for the Carrier: Roles & Processes of IR, Defending Against Claims




  1. Scott Godes (M), Barnes & Thornburg LLP
  2. Shruti Engstrom, Aon
  3. Laurie Kamaiko, Saul Ewing LLP
  4. Peter Karutz, MDD Forensic Accountants
  5. Hunter Maskill , CRC Group | INSUREtrust

Breakout B: Deep Fakes and ChatGPT: A Brave New World of Risks

  • Assessing Use of AI Technology 
  • Chat-GPT-4: Disinformation, Misinformation or Malinformation: Friend or Foe?
  • Legal and Ethical Issues from Nonconsensual & Improper Use 
  • Controls, Risk & Evolving Litigation



  1. Karen Painter Randall (M), Connell Foley LLP
  2. Allen Blount, Risk Strategies
  3. Marc Curvan, Allied World
  4. Cristina Dolan, Columbia University
  5. Tommy Johnson, Coalition

Breakout C: Decluttering EDR, XDR, MDR, and Next-Gen AV

  • Overview of the EDR/XDR Marketplace
  • Difference in EDR, XDR, MDR and Next-Gen Antivirus
  • How Products are Purchased by Private Sector & Public Sector Organizations
  • Identifying Deficiencies in an Insured’s Existing Product to Prevent, Detect & Eradicate Threats
  • Collaborating & Finding the Right Partners for the Client




  1. David Molitano (M), Berkley Cyber Risk Solutions
  2. Marc Brawner, Kroll
  3. Nick Graf, CNA
  4. Anju Owad, Brown & Brown
  5. James Perry, CrowdStrike
2:35 PM — 3:25 PM

Breakout A: Privacy, Pixels, and Protecting Your Policyholders

  • Current Class Action Lawsuits Pertaining to Online Data Privacy Violations
  • How Pixels, Trackers & Cookies Work Together to Violate HIPAA Laws
  • Compliance with New State Privacy Regulations & OCR Guidance
  • Emerging Data Privacy Risks & How to Mitigate Impact
  • Underwriting with Greater Intelligence




  1. Jeremy Barnett (M), LOKKER
  2. Ron Ritenour, RSM US LLP
  3. Danielle Roth, AXA XL
  4. Al Saikali, Shook, Hardy & Bacon LLP
  5. Aleksandra Vold, BakerHostetler

Breakout B: Digital Asset Risk and Solutions

  • What are Digital Assets?
  • Centralized vs Decentralized Digital Network – Web 3.0 evolution
  • Security in Depth – Code Review
  • Cyber, Tech and Crime Exposure
  • Underwriting this Class of Risk
  • Tightening Regulatory Landscape
  • Need for Audits






  1. Neeraj Sahni (M), Aon
  2. Donavan Burgess, Relm Insurance Ltd
  3. Zach Kramer, Proof Insurance Solutions
  4. Allyn Lynd , Cadien Cyber Response
  5. Raymond Zenkich, Evertas

Breakout C: Sector Risk: Infrastructure: Manufacturing

  • Underwriting to Operation Technology vs. Information Technology
  • Coverage Changes to Address This Industry's Exposure
  • Ransomware, BEC and Wrongful Collection Impacts on Manufacturing Industry
  • Restoration & Recovery of Operational Technology
  • Determination of Lost Income & Extra Expenses Incurred in this Space




  1. Shiraz Saeed (M), Arch Insurance
  2. Hilary Higgins , Cipriani & Werner PC
  3. Jessica Klipphahn, WTW
  4. Simon Oddy, Baker Tilly
  5. Brent Riley, Lyra Recovery
3:55 PM — 4:45 PM

Plenary: Motivated Plaintiffs

  • Jurisdictional Comparisons: Finding Fertile Ground
  • Finding Clients and Incidents Ripe for Litigation
  • Developing the Cause of Action
  • Issues of Standing



  1. Doug Meal (M), Orrick
  2. Kate Baxter-Kauf, Lockridge Grindal Nauen PLLP
  3. Kelly Iverson, Lynch Carpenter LLP
  4. James Pizzirusso, Hausfeld
  5. John Yanchunis, Morgan & Morgan
4:45 PM — 6:15 PM

Day 3: Friday, June 2

9:00 AM — 9:50 AM

Plenary: Effective and Agile Ransomware Recovery

  • Possible Outcomes Afrer a Ransomware Attack
  • Proactive Measures to Undertake to Ensure Effective Recovery
  • Immediate Actions to Take During or Immediately After an Attack
  • Working Effectively to Recover an Impacted Environment
  • Additional Strategic & Tactical Recommendations




  1. Tim Francis (M), Travelers
  2. Blair Dawson, McDonald Hopkins
  3. Anthony Dolce, The Hartford
  4. Ed Dubrovsky, CYPFER
  5. Drew Schmitt, GuidePoint Security
9:50 AM — 10:20 AM
10:20 AM — 11:10 AM

Plenary: Artificial Intelligence (AI): Opportunity, Threat or Both?

  1. AI as a Disruptive Technology
  2. Incredible Opportunities
  3. Significant Risks
  4. Leveraging AI in a Balanced Way



  1. Taiye Lambo (M), Holistic Information Security Practitioner Institute
  2. Ruth Promislow, Bennett Jones LLP
  3. Tresa Stephens, Allianz
  4. Brian Thornton, ProWriters
11:10 AM — 12:00 PM

Plenary: De-Isolating the CISO

  • Plenary: De-Isolating the CISO
  • Concerns Around Risk Transparency & Lack of Technical Experience in C-suite/Boards
  • Support for CISOs – Identifying Partners, Communications Readiness, & Role of External Advisors 
  • Discussion of the Uber Case – Lessons Learned
  • Civil & Criminal Liability Considerations




  1. Jamie Singer (M), FTI Consulting
  2. Ted Augustinos, Locke Lord LLP
  3. Jamil Farshchi, Equifax
  4. Lauren Heyndrickx, Ralph Lauren
  5. Joe Martinez, Aon
12:00 PM — 12:00 PM

© 2024 NetDiligence All Rights Reserved.