Miami Beach

Feb 10 — 12

AGENDA

We are committed to adapting our educational programs to address breaking news and emerging trends. With that in mind, the agenda below is subject to change as the event approaches. Registered attendees will be notified by email if significant changes are made to the agenda.

Day 1: Tuesday, October 15

3:00 PM — 4:30 PM

Option A: Interactive Business Interruption Scenario (Sign-up Details Coming via Email on 10/1)

This interactive workshop revolves around a simulated ransomware attack. As the situation unfolds, the company’s incident response team—and, by extension, the participants—will ask questions and make decisions regarding system restoration, negotiation, payment, legal ramifications, notification, public relations, and more. Each time new information is revealed, there will be a break in the action for live table discussions. Following the discussions, participants will help guide the company’s next actions by making selections on their mobile phones. Leveraging Infiniqo’s axon gaming platform to create an immersive, entertaining, and educational experience, this workshop is unlike any you’ve attended before. Sponsored by NetDiligence and Infiniqo.

Panelists
  1. Dave Navetta (M), Cooley LLP
  2. , Tokio Marine HCC
  3. Anthony Hess, Asceris
  4. Ian Kelly, ZeroFox
  5. Zach Olsen, Infinite Global
  6. Vinny Sakore, Arete

Option B: PCI Forensic Investigation Simulation (Sign-up Details Coming via Email on 10/1)

  • Understanding the PCI DSS
  • Legal obligations under the PCI DSS
  • PFI (PCI Forensic Investigation)
  • PFI Scenarios
Panelists
  1. Sean Hoar, Constangy, Brooks, Smith & Prophete, LLP
  2. Brian Robb, Berkshire Hathaway Specialty Insurance
  3. Andrew Valentine, Kroll
5:00 PM — 7:00 PM

Day 2: Wednesday, October 16

7:00 AM — 8:30 AM
8:30 AM — 8:50 AM

Welcome Remarks


  1. Jeremy Barnett, LOKKER
  2. Mark Greisiger, NetDiligence
8:50 AM — 9:30 AM

Driving Better Cyber Risk Decisions Through Data & AI

This conversation with Alex Stamos, former CSO for Facebook and CISO for Yahoo, will delve into the opportunities, challenges and responsibilities of mass data collection and how data can be leveraged to understand and manage today's tough and complex cyber problems. 

  1. Vishaal Hariprasad (M), Resilience
  2. Alex Stamos, Stanford University
9:30 AM — 10:15 AM

Claims and Losses Update: 2019 Trends

  • A Review of the 2019 NetDiligence Cyber Claims Study
  • Types of claims being  covered
  • Examination of cost
  • Claims notice and claims handling
  1. John Mullen (M), Mullen Coughlin LLC
  2. Jeremy Gittler, AXA XL
  3. Mark Greisiger, NetDiligence
  4. Chris Novak, Verizon
  5. Daniel Raymond, Beazley
10:15 AM — 10:45 AM
10:45 AM — 11:35 AM

Breakout A: Challenges of Underwriting: Larger Risks

  • Trends
  • Exposure and Controls
  • Assessment
  • Coverage
  • Pricing
  1. Catherine Mulligan (M), Aon
  2. Emy Donavan, Allianz
  3. Jason Glasgow, Allied World
  4. Christopher Keegan, Brown & Brown
  5. Jacob Petty, WTW

Breakout B: Litigation Update

  • Recent decisions
  • Current trends in civil litigation
  • Current trends in regulatory development
  • Impacts on insurance coverage--Cyber, Property, D&O, and more
  1. Carolyn Purwin Ryan (M), Mullen Coughlin LLC
  2. Tim Blood, Blood Hurst & O'Reardon
  3. Seth Harrington, Orrick
  4. Brian Kint, Cozen O'Connor
  5. Eve-Lynn Rapp, Edelson

Breakout C: Innovation in Insurance: Insuretech, Modeling & APIs

  • Insuretech
  • Tech enabled companies
  • Modeling
  • Identifying what parts of the insurance value chain are ripe for innovation
  • What is the value-add for companies who adopt Insuretech
  • Risks and security concerns
  1. (M), Optio
  2. Jennifer Beckage, The Beckage Firm
  3. Rotem Iram, At-Bay
  4. Philip Rosace, Two Sigma IQ
  5. Brian Thornton, ProWriters
11:40 AM — 12:30 PM

Breakout A: Challenges of Underwriting: Smaller Risks

  • Trends
  • Exposure and Controls
  • Assessment
  • Coverage
  • Pricing
  1. Catherine Rudow (M), Everest Re
  2. Adam Abresch, Acrisure
  3. Tim Francis, Travelers
  4. Monica Minkel, Holmes Murphy
  5. Cristin Sinnott, The Hartford

Breakout B: Hot Issues in Class Actions: Attorney-Client Privilege and More

  • Overview of class action law and application to cybersecurity litigation
  • Recent trends
  • Importance of privilege
  • Practical tips for companies, defense counsel and plaintiff’s counsel
  1. Christina Terplan (M), Atheria Law PC
  2. Doug Meal, Orrick
  3. James Pizzirusso, Hausfeld

Breakout C: Breaking Down Wire Fraud

  • Different types of wire fraud: Social Engineering and Email Hacking
  • Types and ramifications of social engineering
  • Types and ramifications of email hacking
  • Costs associated with social engineering and hacking
  1. Adam Cottini (M), CrowdStrike
  2. Marc Bleicher, Surefire Cyber
  3. Doug Brush, Brush Cyber
  4. Karen Painter Randall, Connell Foley LLP
  5. Matthew Ross, Marsh McLennan Agency
2:00 PM — 2:50 PM

Breakout A: Picking Out the Good from the Scary: Getting Coverage for the Uninsurable

  • Crypto, Cannabis, Gaming and more!
  • What within a class will you underwrite?
  • Under what conditions might it work?
  • Turning a hard "no" into a "maybe"
  1. Christopher Liu (M), Marsh
  2. Gail Arkin, Berkley Cyber Risk Solutions
  3. Florence Levy, Marsh
  4. Robert Rosenzweig, Risk Strategies
  5. Shiraz Saeed, Arch Insurance

Breakout B: CCPA

  • Intended protections and benefits of the CCPA
  • Compliance challenges facing business and insurers
  • Litigation and regulatory risks posed
  • Early trends
  1. Paul Karlsgodt (M), BakerHostetler
  2. John Farley, Gallagher
  3. Sari Ratican, Perkins Coie LLP
  4. Ben Siminou, Siminou Appeals

Breakout C: Cyber Insurance and Blockchain & Cryptocurrency

  • Effective applications within FI and shared economy
  • Evolving risk gaps from these disruptive applications
  • Regulatory issues – ICO, security settlement, GDPR
  • Underwriting challenges to write this class of risk – valuation, auditable controls
  • Opportunities within insurance to mitigate this risk
  1. Jamie Bouloux (M), EmergIn Risk
  2. Cristina Dolan, Columbia University
  3. Nick Economidis, Crum & Forster
  4. Mark Mao, Boies Schiller Flexner LLP
  5. Jason Rebholz, Corvus Insurance
2:55 PM — 3:45 PM

Breakout A: International Claims and Incident Response

  • Challenges of developing international incident response
  • Claims trends outside the US
  • Selection of vendors
  1. Anthony Dolce (M), The Hartford
  2. Ben Auton, SpearTip
  3. Allen Burzen, GBMS USA
  4. Patrick Hill, DAC Beachcroft
  5. Luke Johnson, Canopius

Breakout B: Small Cyber: Is Ostrich Underwriting the Norm?

  • Selling Cyber Insurance as a valuable commodity for cheap!
  • How are placements done
  • Efficiencies
  • Striving to differentiate
  1. Dave Lewison (M), Amwins
  2. Eric Cernak, Hanover
  3. Kimberly Holmes, Dykema
  4. Jack Kudale, Cowbell Cyber
  5. Ted Richmond, RGS Limited

Breakout C: The Inside Job: Employee Rogue Actors & Inadvertent Insiders

  • Inadvertent Insiders and Rogue Employees
  • Best practices in prevention
  • Best practices when loss occurs
  1. Ayesha West (M), WTW
  2. Bridget Quinn Choi, Woodruff Sawyer
  3. Andrea Hoy, A.Hoy & Associates
  4. Jeewon Kim Serrato, Norton Rose Fulbright LLP
  5. Spencer Timmel, Safety National
3:45 PM — 4:15 PM
4:15 PM — 5:05 PM

Can We Fight Cybercrime...and Win?

  • On a mission to fight crime on a unified front
  • What are the crimes, who are the criminals
  • What do the cyber claims data really tell us
  • Collaboration with law enforcement, legislators and industry leaders
  1. Jeremy Barnett (M), LOKKER
  2. Gabriel Andrews, FBI
  3. Julia Choe, US Department of Justice
  4. Doug Howard, Pondurance
  5. Scott Weber, DLA Piper
5:05 PM — 6:30 PM

Day 3: Thursday, October 17

7:00 AM — 8:00 AM
8:00 AM — 8:50 AM

Threat Intelligence

  • Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA)
  • Importance of threat actor identification and attribution
  • Public / Private sector collaboration on cases involving cybercrime and nation state attacks
  • International Law Enforcement Information Sharing
  • NetDiligence Insurance Industry Cybercrime Task Force
  1. Vinny Sakore (M), Arete
  2. Jim Jaeger, Arete
  3. Ryan Leszczynski, FBI
  4. Cindy Murphy, Tetra Defense
  5. Dom Paluzzi, McDonald Hopkins
8:55 AM — 9:45 AM

Breakout A: Cyber War and Terrorism

  • Setting the Scene: War vs. Terrorism
  • Review of common terminology and why we need a War definition
  • Solutions and Next Steps
  1. Matthew Webb (M), Hiscox
  2. Laurie Kamaiko, Saul Ewing LLP
  3. Ben Maidment, Brit Insurance
  4. Siobhan O'Brien, Guy Carpenter
  5. Marko Polunic, CrowdStrike

Breakout B: GDPR Update

  • GDPR: Report on regulatory actions
  • US companies preparedness
  • Other regulatory changes
  • Opportunities and challenges for vendors
  1. Kari Timm (M), BatesCarey LLP
  2. Gregory Bautista, Mullen Coughlin LLC
  3. Ian Birdsey, Clyde & Co LLP
  4. Michael Bruemmer, Experian
  5. Shawn Fleury, Kivu

Breakout C: Cyber Resiliency Beyond Data Protection

  • The Problems: Interdependence, Growth of IoT, Siloed, and Understaffed IT
  • Beyond simple data protection
  • Preparing the organization for cyber events
  • Embracing innovation from the top down
  • Creating a more resilient business model going forward
  1. Steve Anderson (M), Safety National
  2. Ann Barry, Juniper Networks
  3. Daimon Geophert, RSM
  4. Ronald Raether, Troutman Pepper
  5. Andrew Topp, West Monroe Partners
9:45 AM — 10:15 AM
10:15 AM — 11:05 AM

Breakout A: Sector Risk: Manufacturing

  • Trends in threats and losses
  • Unique vulnerabilities in the manufacturing sector
  • Challenges in underwriting
  • Challenges in claims
  • Valuation of loss
  1. Richard DePiero (M), Sompo
  2. James Arnold, KPMG
  3. Harriet Bateman, Baker Tilly
  4. John Spiehs, Swiss Re
  5. Becky Swanson, Hudson Insurance Group

Breakout B: Cyber: To Captive or Not to Captive?

  • Advantages and disadvantages of captive utilization for cyber risk
  • Is captive use specific to certain clients/industries?
  • How can organizations understand how to write cyber risk in a captive
  • How does the commercial and reinsurance market play a part?
  1. Adam Peckman (M), Aon
  2. Tiffany Calhoun, Allianz Commercial
  3. Sean Letz, Marsh JLT Specialty
  4. Andrew Maher, AXIS

Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response

  • Leveraging traditional methods of data identification in incident response
  • Enhancing cyber investigations through machine learning and advanced analytics 
  • Efficiencies gained from using traditional e-discovery techniques
  • Case studies
  1. Jason Gavejian (M), Jackson Lewis P.C.
  2. Jamie Berry, Integreon
  3. Todd Doss, Ankura
  4. Joe Niemczyk, Markel
  5. Melissa Ventrone, Clark Hill PLC
11:10 AM — 12:00 PM

Cyber Cat: Are we ready?

  • Claims preparedness
  • Vendor aggregation
  • Expert exhaustion
  • Coverage and client expectations
  1. Brittany Baker (M), CyberCube Analytics
  2. Patrick Bousfield, Howden Re
  3. Colette Fearon, Munich Re
  4. Thomas Harvey, Moody's RMS
  5. Kara Owens, Markel

© 2024 NetDiligence All Rights Reserved.