This course provides an overview of the ever evolving and increasing sophistication of cyber threat actors. The session will explore the Dark Web and show how easy it is for hackers to purchase any information imaginable. The course will demonstrate where stolen data goes when it's been infiltrated from legitimate companies and why companies must deploy state of the art security to prevent customer and employee data from being posted on the Dark Web. The session will provide claims professionals with a better understanding to evaluate the biggest cyber exposures presented to them. The course will provide information about the criminal conduct facilitated by the Dark Web. The course covers fundamentals of identity theft methods, infiltration of technological safety features, and methods to infiltrate data.
This course discusses how the ever-changing landscape of emerging technologies provides both insureds and insurers with opportunities and threats. The course covers crypto currency, blockchain, connected devices (Internet of Things), and drones, and how each of these technologies may deliver enhanced efficiencies, as well as increased risk, for insurance companies and the overall market.
This course will provide an in-depth look at the more challenging cyber coverage issues facing insurance carriers today. The course will cover the topics of Excess Cyber Policies, Business Interruption Coverage and the potential for Aggregation.
The students will be presented with a claim scenario and will be assigned to roles in which they will ask questions of the claims examiner who will be required to respond, make recommendations and identify strategies for navigating these relationships keeping in mind the goal of claim resolution and career success.
This course will explore the basics of effective presentations: knowing what you want to create (think “Zen”), delivering value to the audience, focusing on authenticity (rather than form!), the search for a fresh approach and presentation tools (podiums, PowerPoint, Prezi, etc.)
This course will evaluate the anatomy of different cyber events, including relevant first-party expenses and/or third-party liability exposures. Learning will take the form of presenting a brief overview of an actual event, utilizing external tools (e.g., social media videos) for educational purposes, engaging in substantive breakout sessions, and participating in a broader group dialog. Specific topics include cyber terrorism, phishing, hacking, and a DDoS Attack.
This course is designed to be an overview of the major functions of management. Emphasis is on planning, organizing, controlling, directing and communicating. Upon completion, students should be able to work as contributing members of a team utilizing these functions of management.