Agenda At-A-Glance

PRE-CONFERENCE WORKSHOP
Thursday July 28, 2016

7:10 – 8:30
(separate registration required; registration opens at 7:00)
The Fundamentals of Cyber and Data Risk Coverage

MAIN CONFERENCE
Day One, Thursday, July 28, 2016

8:00 Main Conference Registration 8:30 Co-Chairs’ Welcome Remarks 8:35 Federal & State Enforcement & Investigative Landscape: Changes on the Horizon and Integrating New and Anticipated Initiatives Into Your Practice 10:15 Break 10:20 Insurance Regulator and Examiner Perspectives on Cyber Risk: Regulating Companies That Hold Sensitive Customer Data, Protecting Data Housed Within Government Departments, Monitoring Solvency of Companies that Write Cyber Liability Policies, and More 11:45 Property Based Risks and Bodily Injury Resulting from a Cyber Event: Who Should Cover These Risks? 12:45 Lunch for Speakers and Delegates 1:45 Coverages That Scope Creep into Cyber Policies as a Result of Data Breaches: Crime, Property, Reputational Harm, Business Interruption, and More 2:45 Coverages That Scope Creep into Cyber Policies as a Result of Data Breaches: Crime, Property, Reputational Harm, Business Interruption, and More 3:35 Break 3:40 In-House Panel on Identifying, Acquiring & Evaluating Cyber Liability Insurance 4:40 The Global Impact of Cyber Attacks and Other Data Breaches: Security and Compliance Risks, Regulatory Developments and Implications for Companies Doing Business Abroad 5:35 Aggregate Issues: Assessing Exposure for Risk When Multiple Insureds are Affected and Better Understanding How Vendors Pose an Aggregate Issue 6:30 Conference Adjourns to Day Two

MAIN CONFERENCE
Day Two, Friday, July 29, 2016

7:30 Continental Breakfast 8:00 Underwriting Considerations for Cyber Policies: Assessing Coverage for the Small, Middle, and Larger Markets, Understanding the Difficulty of Comparing Existing Coverages in the Market, Pricing Policies When There is a Lack of Data, and More 9:40 Break 9:45 The Changing Landscape of Cyber Liability Litigation 11:15 Break 11:20 Board of Directors and C-Level Cyber Readiness for Preventing Cyber Attacks, Understanding the Inherent Risks, and Mitigation Strategies 12:45 Working Toward Prevention of the Breach: What Do Phishing Incidents Look Like?; How Do Forensic Investigations Take Place?; and Are There Ways to Try to Prevent the Breach? 2:00 Conference Ends – Lunch for Workshop B Participants

POST-CONFERENCE WORKSHOP
Friday, July 29, 2016

2:55 – 4:55
(separate registration required; registration opens at 2:30)
Negotiating and Drafting Cyber Risk Provisions and Policies