Agenda
- Jump to:
- At a Glance
- Day 1
- Day 2
- Add-Ons
- Print-friendly Format
Day 1 - Wednesday, April 11, 2018
Day 2 - Thursday, April 12, 2018
7:30 |
Continental Breakfast |
8:00 |
Co-Chairs’ Recap of Day 1 |
8:15 |
|
9:00 |
Cyber Coverages for Property Damage, Bodily Injury, and Crime: Assessing the Gaps, Exclusions, and Policy Options |
10:00 |
Morning Coffee Break |
10:15 |
Business Interruption Coverages and Contingencies in Cyber Policies |
11:00 |
Special Considerations for Sourcing Cyber Policies for the Small to Middle Market |
12:00 |
Cyber Aggregation: Assessing Exposure for Multiple Insureds and Third Parties |
12:30 |
Conference Ends; Lunch for Speakers and Attendees Registered for Post-Conference Workshop |
Post-Conference Workshop
Cyber and Data Risk Insurance Master Class: Evaluating Coverages, Assessing Needs and Negotiating and Customizing Key Policy Provisions
Apr 12, 2018 1:30pm – 2:30pm
Speakers
Elisabeth Case
Managing Director – Cyber and Commercial E&O Advisory Leader
Marsh (Chicago, IL)
Seth D. Lamden
Partner
Neal, Gerber & Eisenberg LLP (Chicago,IL)
Day 1 - Wednesday, April 11, 2018
7:00 |
Registration and Continental Breakfast |
8:00 |
Co-Chairs’ Welcoming RemarksRichard J. Bortnick Kirstin Simonson, CPCU, ARM, AU, ASLI |
8:15 |
The Politics and Policy of Cyber Security: Examining Agency Agendas and Enforcement Initiatives Relative to Breach and DisruptionArsen Ablaev Gene Fishel Michael Hawes Jeremy Pearlman Eric Shiffman Matthew Wernz ModeratorDonna L. Wilson
|
9:30 |
Morning Coffee Break |
9:45 |
|
10:45 |
GDPR: Preparing for Privacy Controls in International Business DealingsSteve Abrahamson Philip L. Gordon Cinthia Granados Motley Nancy L. Perkins Nestor J. Rivera
|
11:45 |
Analyzing the Growth of Biometric Data Collection and Resolving Related Privacy Breach ConcernsDouglas A. Darch Cara Dearman Liisa M. Thomas In 2008, Illinois was one of the first states to pass a stringent law called the Biometric Information Privacy Act (BIPA). BIPA prohibited companies from taking biometric information such as iris scans, fingerprints, or facial recognition without consent. A recent surge of lawsuits throughout the country alleges that companies and employers have taken biometric information without proper consent. In this session, the speakers will explore the new wave of privacy litigation and strategies to manage it. Topics of discussion will include:
|
12:30 |
Networking Luncheon |
1:30 |
Exploring the Cyber Threat of Social EngineeringRichard J. Bortnick Christine Szafranski, CAMS David T. Vanalek The recent wave of phishing attacks promulgated by email scams has exposed the vulnerabilities and weaknesses of the information super highway. The email scam risk is now a global threat as UK hospitals and other entities abroad have been targeted. These threats, whether they are from sanctioned countries or fraudulent hackers within the United States, are wreaking havoc on the Web. Anyone with personal or protected information is affected on some level or another. This session will explore the new wave of social engineering and the catastrophic nature of its risks. Topics of discussion will include:
|
2:30 |
Afternoon Refreshment Break |
2:45 |
Cyber Stress Test for the Internet of Things: Identifying Vulnerabilities, Assessing Threats, and Mitigating LiabilitiesElisabeth Case Edward R. McNicholas Chris Novak Georgiana Wagemann
|
3:45 |
Managing Cyber Liability Claims and Related Class Action LitigationDouglas H. Meal Hillard M. Sterling, Esq.
|
4:30 |
Exploring the Link Between Cyber Risk, Data Breach and D&O LiabilityMILES R. AFSHARNIK, ESQ. Brian H. Mukherjee Jacqueline A. Waters, Esq.
|
5:30 |
Conference Adjourns to Day 2 |
Day 2 - Thursday, April 12, 2018
7:30 |
Continental Breakfast |
8:00 |
Co-Chairs’ Recap of Day 1 |
8:15 |
|
9:00 |
Cyber Coverages for Property Damage, Bodily Injury, and Crime: Assessing the Gaps, Exclusions, and Policy OptionsNick Economidis Kirstin Simonson, CPCU, ARM, AU, ASLI Timothy R. Sullivan Brian J. Dusek
|
10:00 |
Morning Coffee Break |
10:15 |
Business Interruption Coverages and Contingencies in Cyber PoliciesLinda Kornfeld Robert Parisi Colin Raufer Ken Suh
|
11:00 |
Special Considerations for Sourcing Cyber Policies for the Small to Middle MarketMeredith Bennett, RPLU, AU, AIT Tyler O’Connor Andrew Lea
|
12:00 |
Cyber Aggregation: Assessing Exposure for Multiple Insureds and Third PartiesMeghan Hannes Catherine Rudow Neeraj Sahni
|
12:30 |
Conference Ends; Lunch for Speakers and Attendees Registered for Post-Conference Workshop |
Cyber and Data Risk Insurance Master Class: Evaluating Coverages, Assessing Needs and Negotiating and Customizing Key Policy Provisions
Elisabeth Case
Managing Director – Cyber and Commercial E&O Advisory Leader
Marsh (Chicago, IL)
Seth D. Lamden
Partner
Neal, Gerber & Eisenberg LLP (Chicago,IL)
What is it about?
In today’s cyber connected world, cyber and data risk insurance is a critical coverage that every business should have. Assessing coverage needs requires a thorough analysis of vulnerabilities and threats, as well as potential liabilities. In this interactive master class, speakers will explore every facet of a cyber and data risk policy including defining key terms, evaluating coverages, drafting provisions, and outlining limitations and exclusions.
As an attendee you will come away with detailed information on how to negotiate and customize cyber risk provisions and policies in the marketplace.
Topics of discussion will include:
- Survey of types of available cyber coverages
- Preparing a needs assessment checklist
- Determining the scope of first and third party coverage
- Understanding triggers of coverage
- Detecting and clarifying uncertainties in the contract language
- Defining key terms in the cyber policy
- Negotiating significant limitations and exclusions
- Examining consent and panel provisions
- Dovetailing coverage with other insurance and indemnity agreements
- Identifying the appropriate use of manuscript policies, customization, and interpretive letters