Session 1 - The Future of the Cyber Claims Adjuster: A Jack of All Trades
Marcello Antonucci, Beazley
Sean Letz, Marsh
Richard Reiter, Wilson Elser Moskowitz Edelman & Dicker LLP
Maura Wiese, AXA XL
The cyber claims handler’s skills can no longer be limited to handling data breaches. As more companies across a wide range of industries purchase cyber coverage the cyber claims handler will have to deal with a wide range of issues, including complex business interruption losses, data recoveries, systems failures, complex network security liability litigation, product liability, property damage, bodily injury and other issues which cannot fully be foreseen. The inevitable incorporation of these new and old risks into cyber policies will force the cyber claims adjuster to become – A Jack of All Trades.Back to top
Session 2 - The Impact of Cyber Terrorism on the Insurance Process: What Is It, How Do You Recognize It, and What Impact Does It Have on the Lifecycle of Insurance?
Brad Gow, Sompo International Insurance
William Hardin, Charles River Associates
Kari Timm, BatesCarey LLP
Melissa Ventrone, Clark Hill LLC
What is cyber terrorism? How is cyber terrorism defined? How is a security incident or data breach recognized as an event caused by cyber terrorism? When does cybercrime cross over into cyber terrorism and vice versa? Where does ransomware fall into the spectrum of cyber terrorism versus cybercrime? How do insurance companies underwrite these risks? Are insurance companies seeing claims submitted that have a cyber terrorism component? Can companies recognize forensically whether a security incident is a result of cyber terrorism or cybercrime? This session will delve into the question of cyber terrorism and attempt to provide attendees with a concrete foundation to begin to understand the complex question of cyber terrorism and how it impacts cyber insurance and claims.
Session 3 - Internet of Things - Modern Day Warfare and Threats Both Seen and Unseen
Elissa Doroff, National Financial Partners Corp.
Cathleen Rebar, Rebar Kelly
Brian Robb, CNA Insurance
Zach Scheublein, Aon
This session focuses on the Internet of Things, IoT. “Being connected” is a critical aspect of personal and professional productivity. Information flowing over multiple channels and transmitted to multiple device is common place. Remote device access and multiple device access is almost necessary in today’s business. These advancements, while improving productivity, create new risks associated with not only data protection but also personal protection. This session will evaluate the threats associated with the world’s ever growing connectivity, both real and imagined. It will also discuss risk management strategies as well as view the horizon for potential new exposures as the world continues to move from traditional insulated data storage to multiple device access and data transmission.
Keynote: Former New York City Mayor Rudolph W. Giuliani
Former New York City Mayor Rudolph W. Giuliani, Chair of The Cybersecurity, Privacy and Crisis Management Practice at Greenberg Traurig, LLP, will provide the Cyber Liability Summit keynote. He has extensive experience consulting on issues such as law enforcement, crisis management, life safety, intelligence gathering, internal investigations, forensic accounting, and security design and architecture.
Mr. Giuliani’s career highlights include being appointed by President Ronald Reagan to the post of Associate Attorney General and two terms as mayor of New York City, including leading the city after the 9/11 terrorist attacks. He also was named Time magazine’s Person of the Year in 2001; authored a book on leadership; and founded Giuliani Partners, a leading professional services firm in emergency preparedness, public safety, leadership during crises, and financial management.
Session 4 - The Brave New World of HIPAA Enforcement
Allison Davis, The State of New Jersey
Karen Painter Randall, Connell Foley LLP
Howard Panensky, Willis Towers Watson
Maria Suarez, Self Employed
With the increase in digitized records, the creation of HealthCare.gov and exchange of ePHI online, the healthcare industry has become the perfect target for a cyber-attack. The two main regulations governing the release of private health care information is the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) and the Health Information Technology for Economic and Clinical Health Act (“HITECH”). Thus, this presentation will discuss the different types of enforcement actions being brought by the Department of Health & Human Services’ Office for Civil Rights against a “covered entity” in violation of HIPPA/HITECH, as well as how other businesses in the healthcare industry can learn from same. Moreover, this presentation will discuss some of the new types of cyber-attacks facing businesses in this sector, such as a ransomware attack, and the factors considered in deciding whether or not to pay same to the cybercriminal in exchange for the return of sensitive medical information. Lastly, as technology continues to evolve going forward, this presentation will discuss some of the leading security and risk management principles to assist businesses in the healthcare industry to strengthen their security posture.
Session 5 - Handling Cyber - An Insider Look at the Real World of Managing the Resolution of a Cyber Claim
Deborah Hirschorn, AIG
Marissa Olsen, Aspen Insurance
Stuart Panensky, FisherBroyles, LLP
Matthew Tucci, Aspen Insurance
The cyber insurance business is no longer a small niche of insurance, but an essential aspect of nearly every insurer’s selection of product offering. What separates one cyber insurance policy from another is no longer just a matter of examining competing insuring agreements or definitions. More than ever, policyholders demand to know about the readiness, depth and sophistication of the people that will actually be handling a cyber claim in the event of an occurrence. There is great value in a prepared the cyber claim unit. An efficiently and appropriately handled cyber event reduces costs and mitigates future harm from regulatory investigations and third party liability.
We will discuss the nature of cyber risk and hear how policyholders plan, prevent, protect and detect unauthorized access to data. We will explore the claim handling process when there is a data breach. We will explore the legal issues that arise in the face of a data breach and how cyber claims are generally handled by insurers. In the end, this session will provide a perfect foundation for learning more about various cyber risks.
Session 6 - Breaking News and Trends for Professional Liability Cyber Claims and Cases
Jason Meshekow, inTouch Insurance Services
Hillard Sterling, Clausen Miller
Perry Tsao, Willis Towers Watson
Laura Zaroski, Arthur J. Gallagher & Co.
Our panel will examine the latest news and trends arising from the intensifying threats to professional-service firms of data breaches and incidents. Professionals have become proverbial low-hanging fruit for attacks by hackers, who know how to access and exploit the value of sensitive client data. Our panelists will examine several independent yet related areas of keen interest to various industry sectors: the statistics and trends of professionals getting hacked, will review their cyber-policy buying trends. Also, will review the latest developments in insurance claims by professionals, as well as the hottest coverage issues raised by breach claims under cyber and professional-liability policies. Discussion will include the latest developments in cyber-litigation involving professionals, and will offer strategies and practical tips for defending professionals in breach cases.
No Learning Objectives Available