Understanding Cyber Insurance Coverage and Leveraging It

Duration

60  Mins

Level

Basic & Intermediate & Advanced

Webinar ID

IQW19H0827

  • Cyber, privacy, and employee negligence and malfeasance risks companies face
  • When and how should you get involved?
  • What factors influence underwriting decisions?
  • What impact do best practices have on underwriting decisions?
  • How can you avoid situations where coverage is denied?
  • What role is technology playing in underwriting and ongoing policy maintenance?
  • Where coverage may be found in non-cyber insurance policies
  • The state of the law and policy form developments regarding coverage under CGL, Crime, E&O, D&O, and Property policies
  • Your questions during a live Q&A session

Overview of the webinar

Cybersecurity is a major risk for any businesses. Threats from thieves and foreign governments or terrorists are constant and ever-evolving. Every day there is a new data breach or threat. In already difficult economic times, managing this risk should be a paramount concern to companies as they strive to remain successful. One way to manage such risk is through insurance. Cyber insurance is not a replacement for an effective security practice. If anything, when your organization invests in cyber coverage, you may be compelled to step up your game. Learning Objectives are:

  • Understand how companies face exposure for data and privacy losses
  • Learn the best practices being employed by corporations to protect themselves
  • Find out how cyber insurance works and is being used in corporate insurance programs
  • Understand insurance coverage issues for losses and how courts are interpreting "insurance" and "cyber insurance"

 

Who should attend?

This session will be most useful for CISOs and InfoSec leaders. It will provide guidance for working effectively with your organization’s legal team, board, C-suite, insurance broker and underwriters and

  • In-house counsel and risk managers
  • I.T. professionals
  • Insurance brokers
  • Outside private counsel
  • Internal auditors
  • CFOs
  • Controllers
  • Treasurers
  • Accounting staff
  • Presidents
  • Other senior management, attorneys representing insurance companies

Why should you attend?

In this training, the speaker will discuss what cyber insurance is available on the market, how it works in responding to losses, and how businesses are including such insurance in their overall risk management programs. As courts are currently grappling with insurance coverage for data and privacy losses, the speaker will discuss how courts are interpreting traditional and cyber insurance policies in the face of staggering losses.

If you’d like to positively influence the process while avoiding finger-pointing, denied claims, and another gotcha, we encourage you to attend this training to Understand about Cyber Insurance Coverage.

Faculty - Dr.Michael C. Redmond

Ms. Michael C. Redmond specializes in Business Continuity Management, Emergency Management, Crisis Management, Information Security, Business Processes Reorganization, Management Processing, and Regulatory Compliance. Regulatory Compliance includes: FFIEC, Sarbanes Oxley, Patriot, HIPPA, UCC, Basal Accord, and NFPA 1600, NYSE's version, known as Rule 446, and the NASD's Rules 3510 and 3520 and others. She is the CEO of Redmond Worldwide “Enterprise Solutions That Work”sm.
Ms. Redmond has extensive knowledge in Enterprise Risk Management. She has experience in developing and implementing systematic availability programs, post-event operations, and streamlining operations through availability and contingency planning. Ms. Redmond has done many performed as an Internal Auditor in a consulting capacity for many firms Enterprise Risk Programs. She has done Business Continuity/Disaster Recovery Projects for many Universities, Corporations, Government Agencies and the US Military. Ms. Redmond has experience with various applications including, Banking Systems, Financial Applications, Accounting Systems, Payments, Payroll, and Pensions as well as Network Recovery, Telecom Recovery and other areas of technology. Ms. Redmond has prepared Business Continuity Plans for such Data Centers with such technologies as mainframes, local area networks, systems and application software, and telecommunications systems. She has been involved with retrofitting and reconfiguring Data Centers to serve as Hot Sites. She has conducted both Physical Security and Building reviews for facilities. She has consulted for entities in the area of availability planning, specifically relating to End-to-End, Content and Architecture. Ms. Redmond has consulted for a variety of industries including: Financial Institutions, Trading Operations, Manufacturing, Utilities, Educational Facilities, Government Agencies and the Military.

100% MONEY BACK GUARANTEED

Refund / Cancellation policy
For group or any booking support, contact: