P.O. Box 204
Gladwyne, PA 19035
610.896.9715
AGENDA
Day 1: Tuesday, October 15
Option A: Interactive Business Interruption Scenario (Sign-up Details Coming via Email on 10/1)
This interactive workshop revolves around a simulated
ransomware attack. As the situation unfolds, the company’s incident response
team—and, by extension, the participants—will ask questions and make decisions
regarding system restoration, negotiation, payment, legal ramifications,
notification, public relations, and more. Each time new information is
revealed, there will be a break in the action for live table discussions.
Following the discussions, participants will help guide the company’s next
actions by making selections on their mobile phones. Leveraging Infiniqo’s axon
gaming platform to create an immersive, entertaining, and educational
experience, this workshop is unlike any you’ve attended before. Sponsored by
NetDiligence and Infiniqo.
Panelists
- Dave Navetta (M), Cooley LLP
- , Tokio Marine HCC
- Anthony Hess, Asceris
- Ian Kelly, ZeroFox
- Zach Olsen, Infinite Global
- Vinny Sakore, Arete
Option B: PCI Forensic Investigation Simulation (Sign-up Details Coming via Email on 10/1)
- Understanding the PCI DSS
- Legal obligations under the PCI DSS
- PFI (PCI Forensic Investigation)
- PFI Scenarios
Panelists
- Sean Hoar, Constangy, Brooks, Smith & Prophete, LLP
- Brian Robb, Berkshire Hathaway Specialty Insurance
- Andrew Valentine, Kroll
Day 2: Wednesday, October 16
Welcome Remarks
- Jeremy Barnett, LOKKER
- Mark Greisiger, NetDiligence
Driving Better Cyber Risk Decisions Through Data & AI
This conversation with Alex Stamos, former CSO for Facebook and CISO for Yahoo, will delve into the opportunities, challenges and responsibilities of mass data collection and how data can be leveraged to understand and manage today's tough and complex cyber problems.
- Vishaal Hariprasad (M), Resilience
- Alex Stamos, Stanford University
Claims and Losses Update: 2019 Trends
- A Review of the 2019 NetDiligence Cyber Claims Study
- Types of claims being covered
- Examination of cost
- Claims notice and claims handling
- John Mullen (M), Mullen Coughlin LLC
- Jeremy Gittler, AXA XL
- Mark Greisiger, NetDiligence
- Chris Novak, Verizon
- Daniel Raymond, Beazley
Breakout A: Challenges of Underwriting: Larger Risks
- Trends
- Exposure and Controls
- Assessment
- Coverage
- Pricing
- Catherine Mulligan (M), Aon
- Emy Donavan, Allianz
- Jason Glasgow, Allied World
- Christopher Keegan, Brown & Brown
- Jacob Petty, WTW
Breakout B: Litigation Update
- Recent decisions
- Current trends in civil litigation
- Current trends in regulatory development
- Impacts on insurance coverage--Cyber, Property, D&O, and more
- Carolyn Purwin Ryan (M), Mullen Coughlin LLC
- Tim Blood, Blood Hurst & O'Reardon
- Seth Harrington, Orrick
- Brian Kint, Cozen O'Connor
- Eve-Lynn Rapp, Edelson
Breakout C: Innovation in Insurance: Insuretech, Modeling & APIs
- Insuretech
- Tech enabled companies
- Modeling
- Identifying what parts of the insurance value chain are ripe for innovation
- What is the value-add for companies who adopt Insuretech
- Risks and security concerns
- (M), Optio
- Jennifer Beckage, The Beckage Firm
- Rotem Iram, At-Bay
- Philip Rosace, Two Sigma IQ
- Brian Thornton, ProWriters
Breakout A: Challenges of Underwriting: Smaller Risks
- Trends
- Exposure and Controls
- Assessment
- Coverage
- Pricing
- Catherine Rudow (M), Everest Re
- Adam Abresch, Acrisure
- Tim Francis, Liberty Mututal Insurance
- Monica Minkel, Holmes Murphy
- Cristin Sinnott, The Hartford
Breakout B: Hot Issues in Class Actions: Attorney-Client Privilege and More
- Overview of class action law and application to cybersecurity litigation
- Recent trends
- Importance of privilege
- Practical tips for companies, defense counsel and plaintiff’s counsel
- Christina Terplan (M), Atheria Law
- Doug Meal, Boston College Law School
- James Pizzirusso, Hausfeld
Breakout C: Breaking Down Wire Fraud
- Different types of wire fraud: Social Engineering and Email Hacking
- Types and ramifications of social engineering
- Types and ramifications of email hacking
- Costs associated with social engineering and hacking
- Adam Cottini (M), CrowdStrike
- Marc Bleicher, Surefire Cyber
- Doug Brush, Brush Cyber
- Karen Painter Randall, Connell Foley LLP
- Matt Ross, Marsh McLennan Agency
Breakout A: Picking Out the Good from the Scary: Getting Coverage for the Uninsurable
- Crypto, Cannabis, Gaming and more!
- What within a class will you underwrite?
- Under what conditions might it work?
- Turning a hard "no" into a "maybe"
- Christopher Liu (M), Marsh
- Gail Arkin, Berkley Cyber Risk Solutions
- Florence Levy, Marsh
- Robert Rosenzweig, Risk Strategies
- Shiraz Saeed, Arch Insurance
Breakout B: CCPA
- Intended protections and benefits of the CCPA
- Compliance challenges facing business and insurers
- Litigation and regulatory risks posed
- Early trends
- Paul Karlsgodt (M), BakerHostetler
- John Farley, Gallagher
- Sari Ratican, Perkins Coie LLP
- Ben Siminou, Siminou Appeals
Breakout C: Cyber Insurance and Blockchain & Cryptocurrency
- Effective applications within FI and shared economy
- Evolving risk gaps from these disruptive applications
- Regulatory issues – ICO, security settlement, GDPR
- Underwriting challenges to write this class of risk – valuation, auditable controls
- Opportunities within insurance to mitigate this risk
- Jamie Bouloux (M), EmergIn Risk
- Cristina Dolan, PrimeRadiant
- Nick Economidis, Crum & Forster
- Mark Mao, Boies Schiller Flexner LLP
- Jason Rebholz, Corvus Insurance
Breakout A: International Claims and Incident Response
- Challenges of developing international incident response
- Claims trends outside the US
- Selection of vendors
- Anthony Dolce (M), The Hartford
- Ben Auton, SpearTip
- Allen Burzen, GBMS USA
- Patrick Hill, DAC Beachcroft
- Luke Johnson, Canopius
Breakout B: Small Cyber: Is Ostrich Underwriting the Norm?
- Selling Cyber Insurance as a valuable commodity for cheap!
- How are placements done
- Efficiencies
- Striving to differentiate
- Dave Lewison (M), Amwins
- Eric Cernak, Hanover
- Kimberly Holmes, Dykema
- Jack Kudale, Cowbell Cyber
- Ted Richmond, RGS Limited
Breakout C: The Inside Job: Employee Rogue Actors & Inadvertent Insiders
- Inadvertent Insiders and Rogue Employees
- Best practices in prevention
- Best practices when loss occurs
- Ayesha West (M), WTW
- Bridget Quinn Choi, Woodruff Sawyer
- Andrea Hoy, A.Hoy & Associates
- Jeewon Kim Serrato, Norton Rose Fulbright LLP
- Spencer Timmel, Safety National
Can We Fight Cybercrime...and Win?
- On a mission to fight crime on a unified front
- What are the crimes, who are the criminals
- What do the cyber claims data really tell us
- Collaboration with law enforcement, legislators and industry leaders
- Jeremy Barnett (M), LOKKER
- Gabriel Andrews, FBI
- Julia Choe, US Department of Justice
- Doug Howard, Pondurance
- Scott Weber, DLA Piper
Day 3: Thursday, October 17
Threat Intelligence
- Overview of FBI Internet Crime Complaint Center (IC3) Database & the National Cyber-Forensics & Training Alliance (NCFTA)
- Importance of threat actor identification and attribution
- Public / Private sector collaboration on cases involving cybercrime and nation state attacks
- International Law Enforcement Information Sharing
- NetDiligence Insurance Industry Cybercrime Task Force
- Vinny Sakore (M), Arete
- Jim Jaeger, Arete
- Ryan Leszczynski, FBI
- Cindy Murphy, Tetra Defense
- Dom Paluzzi, McDonald Hopkins
Breakout A: Cyber War and Terrorism
- Setting the Scene: War vs. Terrorism
- Review of common terminology and why we need a War definition
- Solutions and Next Steps
- Matthew Webb (M), Howden Re
- Laurie Kamaiko, Saul Ewing LLP
- Ben Maidment, Brit Insurance
- Siobhan O'Brien, Guy Carpenter
- Marko Polunic, CrowdStrike
Breakout B: GDPR Update
- GDPR: Report on regulatory actions
- US companies preparedness
- Other regulatory changes
- Opportunities and challenges for vendors
- Kari Timm (M), BatesCarey LLP
- Gregory Bautista, Mullen Coughlin LLC
- Ian Birdsey, Clyde & Co LLP
- Michael Bruemmer, Experian
- Shawn Fleury, Kivu, Part of Quorum Cyber
Breakout C: Cyber Resiliency Beyond Data Protection
- The Problems: Interdependence, Growth of IoT, Siloed, and Understaffed IT
- Beyond simple data protection
- Preparing the organization for cyber events
- Embracing innovation from the top down
- Creating a more resilient business model going forward
- Steven Anderson (M), Safety National
- Ann Barry, Juniper Networks
- Daimon Geopfert, RSM US LLP
- Ronald Raether, Troutman Pepper
- Andrew Topp, West Monroe Partners
Breakout A: Sector Risk: Manufacturing
- Trends in threats and losses
- Unique vulnerabilities in the manufacturing sector
- Challenges in underwriting
- Challenges in claims
- Valuation of loss
- Richard DePiero (M), Sompo
- James Arnold, KPMG
- Harriet Bateman, MDD Forensic Accountants
- John Spiehs, Swiss Re
- Becky Swanson, Hudson Insurance Group
Breakout B: Cyber: To Captive or Not to Captive?
- Advantages and disadvantages of captive utilization for cyber risk
- Is captive use specific to certain clients/industries?
- How can organizations understand how to write cyber risk in a captive
- How does the commercial and reinsurance market play a part?
- Adam Peckman (M), Aon
- Tiffany Calhoun, Allianz Commercial
- Sean Letz, Marsh JLT Specialty
- Andrew Maher, AXIS
Breakout C: Applying E-Discovery and Forensic Techniques to Incident Response
- Leveraging traditional methods of data identification in incident response
- Enhancing cyber investigations through machine learning and advanced analytics
- Efficiencies gained from using traditional e-discovery techniques
- Case studies
- Jason Gavejian (M), Jackson Lewis P.C.
- Jamie Berry, Integreon
- Todd Doss, Ankura
- Joe Niemczyk, Markel
- Melissa Ventrone, Clark Hill PLC
Cyber Cat: Are we ready?
- Claims preparedness
- Vendor aggregation
- Expert exhaustion
- Coverage and client expectations
- Brittany Baker (M), CyberCube Analytics
- Patrick Bousfield, Howden Re
- Colette Fearon, Munich Re
- Thomas Harvey, Moody's RMS
- Kara Owens, Markel