We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Day 1: Tuesday, October 15

3:00 PM — 4:30 PM

Option A: Interactive Business Interruption Scenario (Sign-up Details Coming via Email on 10/1)

This interactive workshop revolves around a simulated ransomware attack. As the situation unfolds, the company’s incident response team—and, by extension, the participants—will ask questions and make decisions regarding system restoration, negotiation, payment, legal ramifications, notification, public relations, and more. Each time new information is revealed, there will be a break in the action for live table discussions. Following the discussions, participants will help guide the company’s next actions by making selections on their mobile phones. Leveraging Infiniqo’s axon gaming platform to create an immersive, entertaining, and educational experience, this workshop is unlike any you’ve attended before. Sponsored by NetDiligence and Infiniqo.

  1. Dave Navetta (M), Cooley LLP
  2. Tamara Ashjain, Tokio Marine HCC
  3. Anthony Hess, Kivu
  4. Ian Kelly, ID Experts
  5. Zach Olsen, Infinite Global
  6. Vinny Sakore, NetDiligence

Option B: PCI Forensic Investigation Simulation (Sign-up Details Coming via Email on 10/1)

  • Understanding the PCI DSS
  • Legal obligations under the PCI DSS
  • PFI (PCI Forensic Investigation)
  • PFI Scenarios
  1. Sean Hoar, Lewis Brisbois
  2. Brian Robb, CNA
  3. Andrew Valentine, Kroll
5:00 PM — 7:00 PM

Day 2: Wednesday, October 16

7:00 AM — 8:30 AM
8:30 AM — 8:50 AM

Welcome Remarks

  1. Jeremy Barnett, Tokio Marine HCC
  2. Mark Greisiger, NetDiligence
8:50 AM — 9:30 AM

Driving Better Cyber Risk Decisions Through Data & AI

This conversation with Alex Stamos, former CSO for Facebook and CISO for Yahoo, will delve into the opportunities, challenges and responsibilities of mass data collection and how data can be leveraged to understand and manage today's tough and complex cyber problems. 

  1. Vishaal Hariprasad (M),
  2. Alex Stamos, Stanford University
9:30 AM — 10:15 AM

Claims and Losses Update: 2019 Trends

  • A Review of the 2019 NetDiligence Cyber Claims Study
  • Types of claims being  covered
  • Examination of cost
  • Claims notice and claims handling
  1. John Mullen (M), Mullen Coughlin
  2. Jeremy Gittler, AXA XL
  3. Mark Greisiger, NetDiligence
  4. Chris Novak, Verizon
  5. Daniel Raymond, Beazley
10:15 AM — 10:45 AM
10:45 AM — 11:35 AM

Breakout A: Challenges of Underwriting: Larger Risks

  • Trends
  • Exposure and Controls
  • Assessment
  • Coverage
  • Pricing
  1. Catherine Mulligan (M), Aon
  2. Emy Donavan, Allianz
  3. Jason Glasgow, Allied World
  4. Chris Keegan, Beecher Carlson
  5. Jacob Petty, Willis Towers Watson

Breakout B: Litigation Update

  • Recent decisions
  • Current trends in civil litigation
  • Current trends in regulatory development
  • Impacts on insurance coverage--Cyber, Property, D&O, and more
  1. Carolyn Purwin Ryan (M), Cipriani & Werner
  2. Tim Blood, Blood Hurst & O'Reardon
  3. Seth Harrington, Orrick
  4. Brian Kint, Cozen O'Connor
  5. Eve-Lynn Rapp, Edelson

Breakout C: Innovation in Insurance: Insuretech, Modeling & APIs

  • Insuretech
  • Tech enabled companies
  • Modeling
  • Identifying what parts of the insurance value chain are ripe for innovation
  • What is the value-add for companies who adopt Insuretech
  • Risks and security concerns
  1. John Merchant (M), Ascent Underwriting
  2. Jennifer Beckage, Beckage PLLC
  3. Rotem Iram, At-Bay
  4. Philip Rosace, Guidewire
  5. Brian Thornton, ProWriters
11:40 AM — 12:30 PM

Breakout A: Challenges of Underwriting: Smaller Risks

  • Trends
  • Exposure and Controls
  • Assessment
  • Coverage
  • Pricing
  1. Catherine Rudow (M), Nationwide
  2. Adam Abresch, Acrisure
  3. Tim Francis, Travelers
  4. Monica Minkel, USI
  5. Cristin Sinnott, The Hartford

Breakout B: Hot Issues in Class Actions: Attorney-Client Privilege and More

  • Overview of class action law and application to cybersecurity litigation
  • Recent trends
  • Importance of privilege
  • Practical tips for companies, defense counsel and plaintiff’s counsel
  1. Christina Terplan (M), Atheria Law
  2. Doug Meal, Orrick LLP
  3. James Pizzirusso, Hausfeld

Breakout C: Breaking Down Wire Fraud

  • Different types of wire fraud: Social Engineering and Email Hacking
  • Types and ramifications of social engineering
  • Types and ramifications of email hacking
  • Costs associated with social engineering and hacking
  1. Adam Cottini (M), CrowdStrike
  2. Marc Bleicher, Arete Advisors
  3. Doug Brush, Special Counsel
  4. Karen Painter Randall, Connell Foley
  5. Matthew Ross, CNA
2:00 PM — 2:50 PM

Breakout A: Picking Out the Good from the Scary: Getting Coverage for the Uninsurable

  • Crypto, Cannabis, Gaming and more!
  • What within a class will you underwrite?
  • Under what conditions might it work?
  • Turning a hard "no" into a "maybe"
  1. Christopher Liu (M), AIG
  2. Gail Arkin, Berkley Cyber Risk Solutions
  3. Florence Levy, Marsh JLT Specialty
  4. Rob Rosenzweig, Risk Strategies
  5. Shiraz Saeed, Starr Companies

Breakout B: CCPA

  • Intended protections and benefits of the CCPA
  • Compliance challenges facing business and insurers
  • Litigation and regulatory risks posed
  • Early trends
  1. Paul Karlsgodt (M), Baker Hostetler
  2. John Farley, A.J. Gallagher
  3. Sari Ratican, Perkins Coie LLP
  4. Ben Siminou, Siminou Appeals

Breakout C: Cyber Insurance and Blockchain & Cryptocurrency

  • Effective applications within FI and shared economy
  • Evolving risk gaps from these disruptive applications
  • Regulatory issues – ICO, security settlement, GDPR
  • Underwriting challenges to write this class of risk – valuation, auditable controls
  • Opportunities within insurance to mitigate this risk
  1. Jamie Bouloux (M), EmergIn Risk
  2. Cristina Dolan, insideCHAINS
  3. Nick Economidis, Crum & Forster
  4. Mark Mao, Boies Schiller Flexner LLP
  5. Jason Rebholz, MOXFIVE
2:55 PM — 3:45 PM

Breakout A: International Claims and Incident Response

  • Challenges of developing international incident response
  • Claims trends outside the US
  • Selection of vendors
  1. Tony Dolce (M), Chubb
  2. Ben Auton, SpearTip
  3. Allen Burzen, Equifax
  4. Patrick Hill, DAC Beachcroft
  5. Luke Johnson, Canopius

Breakout B: Small Cyber: Is Ostrich Underwriting the Norm?

  • Selling Cyber Insurance as a valuable commodity for cheap!
  • How are placements done
  • Efficiencies
  • Striving to differentiate
  1. David Lewison (M), AmWINS
  2. Eric Cernak, Hanover
  3. Kim Holmes, TDC Specialty
  4. Jack Kudale, Cowbell Cyber
  5. Ted Richmond, RGS Limited

Breakout C: The Inside Job: Employee Rogue Actors & Inadvertent Insiders

  • Inadvertent Insiders and Rogue Employees
  • Best practices in prevention
  • Best practices when loss occurs
  1. Ayesha West (M), Everest Insurance
  2. Bridget Choi, The Hartford
  3. Andrea Hoy, A.Hoy & Associates
  4. Jeewon Kim Serrato, Norton Rose Fulbright
  5. Spencer Timmel, Safety National
3:45 PM — 4:15 PM
4:15 PM — 5:05 PM

Can We Fight Cybercrime...and Win?

  • On a mission to fight crime on a unified front
  • What are the crimes, who are the criminals
  • What do the cyber claims data really tell us
  • Collaboration with law enforcement, legislators and industry leaders
  1. Jeremy Barnett (M), Tokio Marine HCC
  2. Gabriel Andrews, FBI
  3. Julia Choe, US Department of Justice
  4. Doug Howard, RSA
  5. Scott Weber, DLA Piper
5:05 PM — 6:30 PM

Day 3: Thursday, October 17

7:00 AM — 8:00 AM
8:00 AM — 8:50 AM

Threat Intelligence

  • Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA)
  • Importance of threat actor identification and attribution
  • Public / Private sector collaboration on cases involving cybercrime and nation state attacks
  • International Law Enforcement Information Sharing
  • NetDiligence Insurance Industry Cybercrime Task Force
  1. Vinny Sakore (M), NetDiligence
  2. Jim Jaeger, Arete Advisors
  3. Ryan Leszczynski, FBI
  4. Cindy Murphy, Tetra Defense
  5. Dom Paluzzi, McDonald Hopkins
8:55 AM — 9:45 AM

Breakout A: Cyber War and Terrorism

  • Setting the Scene: War vs. Terrorism
  • Review of common terminology and why we need a War definition
  • Solutions and Next Steps
  1. Matthew Webb (M), Hiscox
  2. Laurie Kamaiko, Saul Ewing Arnstein & Lehr
  3. Ben Maidment, Brit Insurance
  4. Siobhan O'Brien, Guy Carpenter
  5. Marko Polunic, Munich Re

Breakout B: GDPR Update

  • GDPR: Report on regulatory actions
  • US companies preparedness
  • Other regulatory changes
  • Opportunities and challenges for vendors
  1. Kari Timm (M), BatesCarey LLP
  2. Gregory Bautista, Wilson Elser Moskowitz Edelman & Dicker LLP
  3. Ian Birdsey, Pinsent Masons LLP
  4. Michael Bruemmer, Experian
  5. Shawn Fleury, The Crypsis Group

Breakout C: Cyber Resiliency Beyond Data Protection

  • The Problems: Interdependence, Growth of IoT, Siloed, and Understaffed IT
  • Beyond simple data protection
  • Preparing the organization for cyber events
  • Embracing innovation from the top down
  • Creating a more resilient business model going forward
  1. Steve Anderson (M), QBE
  2. Ann Barry, Juniper Networks
  3. Daimon Geophert, RSM
  4. Ronald Raether, Troutman Sanders
  5. Andrew Topp, West Monroe Partners
9:45 AM — 10:15 AM
10:15 AM — 11:05 AM

Breakout A: Sector Risk: Manufacturing

  • Trends in threats and losses
  • Unique vulnerabilities in the manufacturing sector
  • Challenges in underwriting
  • Challenges in claims
  • Valuation of loss
  1. Richard DePiero (M), Sompo International
  2. James Arnold, KPMG
  3. Harriet Bateman, Baker Tilly
  4. John Spiehs, Swiss Re
  5. Becky Swanson, Hudson Insurance Group

Breakout B: Cyber: To Captive or Not to Captive?

  • Advantages and disadvantages of captive utilization for cyber risk
  • Is captive use specific to certain clients/industries?
  • How can organizations understand how to write cyber risk in a captive
  • How does the commercial and reinsurance market play a part?
  1. Adam Peckman (M), Aon
  2. Tiffany Calhoun, L&F Holdings Group
  3. Sean Letz, Marsh JLT Specialty
  4. Andrew Maher, AXIS

Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response

  • Leveraging traditional methods of data identification in incident response
  • Enhancing cyber investigations through machine learning and advanced analytics 
  • Efficiencies gained from using traditional e-discovery techniques
  • Case studies
  1. Jason Gavejian (M), Jackson Lewis P.C.
  2. Jamie Berry, Integreon
  3. Christopher Doss, Ankura
  4. Joe Niemczyk, Markel
  5. Melissa Ventrone, Clark Hill PLC
11:10 AM — 12:00 PM

Cyber Cat: Are we ready?

  • Claims preparedness
  • Vendor aggregation
  • Expert exhaustion
  • Coverage and client expectations
  1. Brittany Baker (M), CyberCube Analytics
  2. Patrick Bousfield, Capsicum Re
  3. Colette Fearon, Munich Re
  4. Thomas Harvey, RMS
  5. Kara Owens, Markel