TECconW16Banner

Agenda
Speakers
Register

HB Litigation Conferences presents the

NetDiligence® Cyber Risk & Privacy Liability Forum

October 18-19, 2016 | Santa Monica | Welcome reception October 17, 2016

Program Chairs

Oliver Brew Aspen Insurance Group

Steven Anderson QBE

David Lewison AmWins

Andrew ObuchowskiRSM

John Mullen Lewis Brisbois Bisgaard & Smith


Monday, October 17

Welcome Reception


Tuesday, October 18


7:00 a.m. | Registration & Breakfast


8:15 a.m. | Welcome & Opening Remarks


8:45 a.m. |  Cyber Claims & Loss Updates

  • NetDiligence Claims Study
  • Types of claims being covered
  • Examination of cost
  • Claims notice & claims handling

Mark Greisiger NetDiligence
Jeremy Gittler XL Catlin
Chris Novak Verizon


 


10:00 a.m. | Breakouts



12:30 p.m. | Lunch 

Keynote Speaker:

Joel Brenner

Joel Brenner LLC

Sponsored by:travelerslogo


1:45 p.m.
CISO Objections to the Need for Cyber Coverage

  • CISO Objections to Coverage
  • What does Cyber Insurance cover that even the best security and incident response cannot?
  • Balancing investment in security with other risk management methods.

Jill Salmon Berkshire Hathaway, moderator
Toby Merrill Chubb
Tanya Forsheit Baker Hostetler
Kurt Hagerman Armour
Matt Kletzli Victor O. Schinnerer & Company, Inc.


2:45 p.m. |  Refreshment Break

MacDonaldHopkinsLogo


3:15 p.m. | Breakouts 


4:30 p.m. | Automation and The Next Generation of Cyber Security

  • How to solve the human capital problem
  • Cyber security for the executives
  • How to prepare your evidence and properly engage with law enforcement.
  • Creating velocity and the power of orchestration within security practice
  • How to create real-time legal oversight of cyber security through platform operations
  • How to lower risk, measure risk, and manage risk within an organization.

Joe Loomis CyberSponse, moderator
Aleksandr Yampolskiy Security Scorecard
Carson Zimmerman MITRE
Rohyt Belani PhishMe
Martin Stanley U.S. Department of Homeland Security


5:30 p.m. | Cocktail Reception 

B


Wednesday, June 8


7:15 a.m. | Registration and Breakfast

KivuLogo


8:00 a.m. |  Anatomy of a Data Breach from a Regulator’s Perspective

  • Notice requirements: Are regulators and companies on the same page?
  • Whether and how regulators assist companies with breach response.
  • What do regulators want from companies during investigations?
  • What can companies expect?

Bo Holland AllClear IDmoderator
Patrice Malloy Florida Assistant Attorney General
Gene Fishel Virginia Assistant Attorney General
Nicole DiTomo Pennsylvania Deputy Attorney General


9:05 a.m. | Breakouts

A
(Ballroom)

Cyber Risks and Exposure in the Manufacturing Sector

  • Issues of property damage, supply chain & business interruption
  • Operating systems: warranties and upgrades
  • Problems with automation and robots
  • IP resides in manufacturing enclaves that are sometimes hard to control
  • Espionage and ransomware

Andy Obuchowski RSM, moderator
Chris Keegan Beecher Carlson
Jeff Stutzman Wapack Labs
Brad Murlick Navigant

B
(Rose Garden)

Vendor Management

  • What is at risk?
  • The legal landscape
  • Vendor risk by industry
  • Vendor contracts
  • Insurance coverage – key terms and conditions
  • Network assessments
  • Vendor management programs

John Farley HUB, moderator
Bob Parisi Marsh
Adam Cottini Arthur J. Gallagher
Jenny Soubra Allianz
Ernest Koschineg Cipriani & Werner
John Coletti XL Catlin


10:15 a.m. | Breakouts

A
(Rose Garden)

The Cloud Providers: Current and Emerging Issues

  • Securing of data going East-West
  • Cloud of SLA issues
  • Outages and reliability
  • Securing hybrid IT

Steven Anderson QBE, moderator
Shawn Carey Keystone NAP
Mark Weatherford vArmour
Michael Ernesto Verizon Advanced Solutions

B
(Ballroom)

Systemic Risk and Aggregation Modeling Systemic Risk

Cloud outage and aggregate effect; zero-day malware; grid outage

Internet brownout; attacks against ‘common network technology’

What are the particular issues to staffing a large-scale incident?

Aggregation Modeling

How models can be used to assess cyber exposures.

What tools and benchmarks can be used to evaluate risk for cyber insurance coverage?

Tim Francis Travelers, moderator
Russ Cohen Chubb
Vikas Shah Milliman
Jay Jacobs Bitsight
Sasha Romanosky RAND Corporation


11:05 a.m. | Refreshment Break


11:30 a.m. | Compliance: Security Assessments, Training, and Planning

Security assessments

Training

Incident response planning

Learn how to maximize breach response effectiveness and customer satisfaction and minimize litigation and regulatory risks

Best practices for mounting an effective security incident response strategy, including meeting compliance and exceeding customer expectations

Examine what your ethical obligations are to protect consumers and provide identity protection when a data breach hits

Learn how to navigate the legal intricacies and complexities involving security incidents and data breaches

Ted Kobus BakerHostetler, moderator
Jeremy Henley ID Experts
Shawn Melito NPC
Darren Guccione KeeperSecurity
Steve Meckl Symantec
Ondrej Krehel LIFARS


12:30 p.m. | Closing Remarks & Conference Adjourns


Thanks to our sponsors!