Miami Beach

Feb 10 — 12

AGENDA

We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Day 1: Monday, October 1

3:00 PM — 4:30 PM

Interactive Breach Scenarios

  • An understanding of a more recent, and prevalent, cyber security threats
  • An overview of legal, compliance and response obligations
  • Strategies on dealing with hackers and media during a breach
  • How to mount a response and what services and products to include
Panelists
  1. Ian Birdsey, Clyde & Co LLP
  2. Jonathan Fairtlough, Kroll
  3. Remi Gonzalez, Public Communications Inc.
  4. Jeffrey Schermerhorn, WTW
  5. Brookes Taney, Arete

Six Months After GDPR: Lessons Learned

  • Analysis of legal, regulatory and cyber risks that have evolved since implementation of GDPR
  • How to prioritize planning and implementation efforts
  • Addressing key GDPR compliance risks
  • Interactive scenario
Panelists
  1. Ed Cabrera, Trend Micro
  2. Art Ehuan, Crypsis Group
  3. Jay Kramer, Lewis Brisbois
5:00 PM — 7:00 PM

Day 2: Tuesday, October 2

7:00 AM — 8:30 AM
8:30 AM — 9:00 AM
9:00 AM — 9:45 AM

Claims and Losses Update

  • A Review of the 2018 NetDiligence Cyber Claims Study
  • Corax/Clyde & Co Cyber Breach Insights Report
  • Types of claims being covered
  • Examination of cost
  1. Christina Terplan (M), Atheria Law PC
  2. , Tokio Marine HCC
  3. Mark Greisiger, NetDiligence
  4. Lewis Guignard, Guidewire
  5. Deborah Hirschorn, Lockton Companies
9:45 AM — 10:45 AM

Breakout A: Business Interruption & Contingent BI

  • How does a Business Interruption claim occur?
  • How would different industries look at a BI loss?
  • What are the steps in evaluating and calculating the loss?
  • Mitigating BI exposure
  • Who is buying and how much?
  1. Matthew Webb (M), Hiscox
  2. Daimon Geophert, RSM
  3. Christopher Liu, Marsh
  4. Simon Oddy, Baker Tilly
  5. Payal Patel, Marsh McLennan

Breakout B: California Consumer Privacy Act of 2018

  • Legislative history behind the CCPA
  • Intended protections and benefits of the CCPA
  • Compliance challenges facing business and insurers
  • Litigation and regulatory risks posed
  • Will other states follow?
  1. Paul Karlsgodt (M), BakerHostetler
  2. Lydia de la Torre , Satan Clara Law School
  3. Brian Kabateck, Kabateck Brown Kellner, LLP
  4. Rebecca Perry, Jordan Lawrence

Breakout C: Business Email Compromises

  • Microsoft 360 and other trends
  • Security & prevention
  • High level discussion of coverage and claims
  1. Robert Rosenzweig (M), Risk Strategies
  2. Rick Bortnick, Traub Lieberman
  3. Cindy Murphy, Tetra Defense
  4. David Nides, KPMG
  5. David Rock, Trium Cyber
10:45 AM — 11:15 AM
11:15 AM — 12:15 PM

Breakout A: SME Pricing and Coverage

  • Small Office Network security architecture and pitfalls
  • Assessments
  • Coverage and pricing
  • Claims
  1. Wendy Dowd (M), Y-Risk
  2. Adam Abresch, Acrisure
  3. David Ellis, Security Metrics
  4. Rotem Iram, At-Bay

Breakout B: Bench & Bar Fireside Chat

  • The judicial role in resolving disputes in civil litigation
  • The judicial perspective on cyber-related claims
  • Best practices for litigants and clients before the judiciary
  • The future of cyber litigation
  1. Adam Losey (M), Losey PLLC
  2. Patrick Walsh, U.S. District Court, Central District of California

Breakout C: Automation of Security

  • Common threat actors and security concerns
  • Lack of human resource capacity in the market
  • Automation of security
  • Artificial intelligence solutions
  1. Steve Anderson (M), Safety National
  2. Doug Clare, FICO
  3. Matt Gardner, California Technology Council
  4. Nick Graf, CNA
12:15 PM — 1:45 PM
1:45 PM — 2:45 PM

Breakout A: International Regulatory Update

  • GDPR: Report on Early Days
  • Asia, Australia, Singapore & Canada
  • Regulatory Guidance and Enforcement under new laws
  • Litigation Update
  • Insurance Response
  • Case Study
  1. Jennifer Coughlin (M), Mullen Coughlin LLC
  2. Hans Allnutt, DAC Beachcroft
  3. Alex Cameron, Fasken
  4. Catherine Mulligan, Aon
  5. Joshua Pyle, CyberCube Analytics

Breakout B: Medical Devices and IoT

  • Vulnerabilities & Mitigation Best Practices
  • Current Regulatory Guidance
  • Litigation Trends
  • Insurance Market Developments
  1. Kimberly Holmes (M), Dykema
  2. Adam Cottini, CrowdStrike
  3. Jacob Dorval, RSA
  4. Cinthia Granados Motley, Dykema Gossett PLLC

Breakout C: People Problems

  • Current trends in self-induced breaches
  • Prevention and mitigation
  • Negligent insider vs malicious insider
  • Workplace culture that protects the organization
  1. Rebecca Pearson (M), WTW
  2. James Goddard, Kaiser Permanente
  3. Ian Kelly, ZeroFox
  4. Joseph Lazzarotti, Jackson Lewis P.C.
  5. Jessica Tabrizi, Travelers
2:45 PM — 3:45 PM

Breakout A: Cyber Cat: Are we ready?

  • Claims preparedness
  • Vendor aggregation
  • Expert exhaustion
  • Coverage and client expectations
  1. Oliver Brew (M), Lockton Re
  2. Annamaria Landaverde , Unaffiliated
  3. Jeremy Platt , Guy Carpenter
  4. Matthew Prevost, Chubb
  5. Scott Stransky, Marsh McLennan

Breakout B: Ethical Obligations for Lawyers

  • Achieving technical competence
  • Balancing data security, privacy concerns & ethical rules
  • Confidentiality and preserving priviledge
  • Vetting and supervising non-lawyer vendors
  1. Rob Driscoll (M), Tracepoint
  2. John Barrett, BDP International, Inc
  3. Jennifer Beckage, The Beckage Firm
  4. Bill Hardin, Charles River Associates

Breakout C: Breach Communications and the Media

  • Balancing legal risk/regulatory disclosure requirements with reputational risk
  • Brand recognition and the lifecycle of news coverage
  • Scrutiny on impacted business post notification
  • Tension between impacted organization and media
  1. Blaine Kimrey (M), Vedder Price
  2. Michael Bruemmer, Experian
  3. Allison Grande, Law360
  4. Andrew Liuzzi, Deloitte
  5. Paul Roberts, Security Ledger
3:45 PM — 4:15 PM
4:15 PM — 5:00 PM

CISO Round-Up

  • Integrating risk management into the insurance process
  • Technological focus on current threats and priorities
  • Governance and compliance within their role
  1. Tom Gallo (M), AllClear ID
  2. David Rusting, University of California
  3. Anahi Santiago, ChristianaCare
  4. Gareth Wharton, Hiscox
5:00 PM — 6:30 PM
9:00 PM — 11:30 PM

Day 3: Wednesday, October 3

7:00 AM — 8:00 AM
8:00 AM — 8:45 AM

Insurance Industry Cyber Crime Task Force

  • On a mission to fight crime on a unified front
  • What are the crimes, who are the criminals
  • What do the cyber claims data really tell us
  • Collaboration with law enforcement, legislators and industry leaders
  1. Jeremy Barnett (M), LOKKER
  2. Jennifer Coughlin, Mullen Coughlin LLC
  3. Winston Krone, Kivu
  4. Christian Lees, InfoArmor
  5. Brian Robb, Berkshire Hathaway Specialty Insurance
8:45 AM — 9:30 AM

Breakout A: Multinational Breach Management

  • Practicalities of multi-jurisdictional regulatory compliance
  • Vendor selection
  • Data transfer issues
  • Language issues
  1. Jacqueline Spencer-Sim (M), Hamilton Insurance Group
  2. Bo Holland, AllClear ID
  3. Ernest Koschineg, Cipriani & Werner PC
  4. Melanie Witte, AXA XL
  5. Wendy Wu, Stroz Friedberg

Breakout B: Challenging and Mitigating PCI Fines

  • Underwriting PCI fines and assessments
  • Legal defenses at the claims stage
  • Expert forensics role in defense of fines and assessments
  • Claims role in supporting defense against fines and assessments
  1. Evan Fenaroli (M), Philadelphia Insurance Companies
  2. Craig Linton, Beazley
  3. Doug Meal, Orrick
  4. Sam Rubin, Crypsis Group

Breakout C: Cannabis Data Security and Cyber Insurance

  • State-regulated markets in the context of federal law and enforcement
  • Data security risks faced by licensed cannabis operators
  • Obstacles in underwriting cannabis cyber risks
  • Filling current gaps in available coverage 
  1. Ian Stewart (M), Wilson Elser
  2. Doug Brush, Brush Cyber
  3. Charles Pyfrom, Next Wave Insurance Services Inc.
9:30 AM — 10:00 AM
10:00 AM — 10:45 AM

Breakout A: Blockchain and Insurance

  • What is blockchain technology?
  • Security and scalability
  • Potential regulatory impact
  • Cyber Insurance opportunity
  1. John Farley (M), Gallagher
  2. Richard DePiero, Sompo
  3. Cristina Dolan, Columbia University
  4. Shannon Groeber, CFC
  5. Mark Mao, Boies Schiller Flexner LLP

Breakout B: Reputational Harm

  • Is reputation insurable?
  • Available coverage
  • Triggers for coverage
  • Calculating loss
  1. Matthew Hogg (M), Liberty Global Group
  2. Elissa Doroff, Mosaic Insurance
  3. Massimo Messina, Ankura
  4. L P, acme
  5. Richard Sheridan, Berkley Cyber Risk Solutions

Breakout C: Assessing the Insured: Role of the CISO

  • Application forms and the CISO
  • Security budgets, processes & procedures, and tools
  • Multidisciplinary input on the application
  1. Spencer Timmel (M), Safety National
  2. Doug Freimarck, Prospect Medical Holdings, Inc.
  3. Jim Jaeger, Arete
  4. Christopher Keegan, Brown & Brown
  5. Kerrigan Malek, The Hartford
10:45 AM — 11:30 AM

Quantifying Silent Cyber Risk

  • Cyber and digital risk is increasingly pervasive across all classes of insurance
  • How cyber-attacks trigger silent (non affirmative) coverage
  • Best Practies building a non-affirmative cyber risk management framework
  • Modeling Silent Cyber
  1. Kara Owens (M), Markel
  2. Erica Davis, Guy Carpenter
  3. Thomas Harvey, Moody's RMS
  4. Laurie Kamaiko, Saul Ewing LLP
  5. John Spiehs, Swiss Re

© 2024 NetDiligence All Rights Reserved.