Agenda At-A-Glance

PRE-CONFERENCE WORKSHOP

Thursday July 28, 2016

7:10 – 8:30
(separate registration required; registration opens at 7:00)

The Fundamentals of Cyber and Data Risk Coverage

MAIN CONFERENCE

Day One, Thursday, July 28, 2016

8:00
Main Conference Registration

8:30
Co-Chairs’ Welcome Remarks

8:35
Federal & State Enforcement & Investigative Landscape: Changes on the Horizon and Integrating New and Anticipated Initiatives Into Your Practice

10:15
Break

10:20
Insurance Regulator and Examiner Perspectives on Cyber Risk: Regulating Companies That Hold Sensitive Customer Data, Protecting Data Housed Within Government Departments, Monitoring Solvency of Companies that Write Cyber Liability Policies, and More

11:45
Property Based Risks and Bodily Injury Resulting from a Cyber Event: Who Should Cover These Risks?

12:45
Lunch for Speakers and Delegates

1:45
Coverages That Scope Creep into Cyber Policies as a Result of Data Breaches: Crime, Property, Reputational Harm, Business Interruption, and More

2:45
Coverages That Scope Creep into Cyber Policies as a Result of Data Breaches: Crime, Property, Reputational Harm, Business Interruption, and More

3:35
Break

3:40
In-House Panel on Identifying, Acquiring & Evaluating Cyber Liability Insurance

4:40
The Global Impact of Cyber Attacks and Other Data Breaches: Security and Compliance Risks, Regulatory Developments and Implications for Companies Doing Business Abroad

5:35
Aggregate Issues: Assessing Exposure for Risk When Multiple Insureds are Affected and Better Understanding How Vendors Pose an Aggregate Issue

6:30
Conference Adjourns to Day Two

MAIN CONFERENCE

Day Two, Friday, July 29, 2016

7:30
Continental Breakfast

8:00
Underwriting Considerations for Cyber Policies: Assessing Coverage for the Small, Middle, and Larger Markets, Understanding the Difficulty of Comparing Existing Coverages in the Market, Pricing Policies When There is a Lack of Data, and More

9:40
Break

9:45
The Changing Landscape of Cyber Liability Litigation

11:15
Break

11:20
Board of Directors and C-Level Cyber Readiness for Preventing Cyber Attacks,
Understanding the Inherent Risks, and Mitigation Strategies

12:45
Working Toward Prevention of the Breach: What Do Phishing Incidents Look Like?; How Do Forensic Investigations Take Place?; and Are There Ways to Try to Prevent the Breach?

2:00
Conference Ends – Lunch for Workshop B Participants

POST-CONFERENCE WORKSHOP

Friday, July 29, 2016

2:55 – 4:55
(separate registration required; registration opens at 2:30)

Negotiating and Drafting Cyber Risk Provisions and Policies