#NetCyberCon

TECconE16BannerLG2-1024x346 th


 

HB Litigation Conferences presents the

NetDiligence® Cyber Risk & Privacy Liability Forum

June 7-8, 2016 | Philadelphia | Welcome reception June 6, 2016

Program Chairs

David Navetta Norton Rose Fulbright

Bo Holland AllClear ID

John Merchant Validus
Rebecca Swanson Markel
Jill Salmon Berkshire Hathaway Specialty Insurance


Monday, June 6

5:30 p.m. | Welcome Reception

Printlewis-brisbois-bisgaard--smith-llp-77738043Logo_CMYK


Tuesday, June 7

All-Day Coffee Bar

Print


 

7:00 a.m. | Registration & Breakfast 

NAS Insurance


8:15 a.m. | Welcome & Opening Remarks


8:45 a.m. |  Cyber Claims & Loss Updates

  • NetDiligence Claims Study
  • Types of claims being covered
  • Examination of cost
  • Claims notice & claims handling

Meredith Schnur Wells Fargo, moderator
Mark Greisiger NetDiligence
Beth Diamond Beazley
Jeremy Gittler XL Catlin
Chris Novak Verizon
Rob Jones AIG 


10:00 a.m. | Breakouts

 

 

 

 


11:00 a.m. | Break and Refreshments   

logo_SWRX_full-color


11:30 a.m. |  Break Outs


 


12:30 p.m. | Lunch 

Keynote Speaker:

Joel Brenner

Joel Brenner LLC

Sponsored by:travelerslogo


1:45 p.m.
CISO Objections to the Need for Cyber Coverage

  • CISO Objections to Coverage
  • What does Cyber Insurance cover that even the best security and incident response cannot?
  • Balancing investment in security with other risk management methods.

Jill Salmon Berkshire Hathaway, moderator
Toby Merrill Chubb
Tanya Forsheit Baker Hostetler
Kurt Hagerman Armour
Matt Kletzli Victor O. Schinnerer & Company, Inc.


2:45 p.m. |  Refreshment Break

MacDonaldHopkinsLogo


3:15 p.m. | Breakouts 

 


4:30 p.m. | Automation and The Next Generation of Cyber Security

  • How to solve the human capital problem
  • Cyber security for the executives
  • How to prepare your evidence and properly engage with law enforcement.
  • Creating velocity and the power of orchestration within security practice
  • How to create real-time legal oversight of cyber security through platform operations
  • How to lower risk, measure risk, and manage risk within an organization.

Joe Loomis CyberSponse, moderator
Aleksandr Yampolskiy Security Scorecard
Carson Zimmerman MITRE
Rohyt Belani PhishMe
Martin Stanley U.S. Department of Homeland Security


5:30 p.m. | Cocktail Reception 

B


Wednesday, June 8


7:15 a.m. | Registration and Breakfast

KivuLogo


 

8:00 a.m. |  Anatomy of a Data Breach from a Regulator’s Perspective

  • Notice requirements: Are regulators and companies on the same page?
  • Whether and how regulators assist companies with breach response.
  • What do regulators want from companies during investigations?
  • What can companies expect?

Bo Holland AllClear IDmoderator
Patrice Malloy Florida Assistant Attorney General
Gene Fishel Virginia Assistant Attorney General
Nicole DiTomo Pennsylvania Deputy Attorney General


9:05 a.m. | Breakouts

A
(Ballroom)

Cyber Risks and Exposure in the Manufacturing Sector

  • Issues of property damage, supply chain & business interruption
  • Operating systems: warranties and upgrades
  • Problems with automation and robots
  • IP resides in manufacturing enclaves that are sometimes hard to control
  • Espionage and ransomware

Andy Obuchowski RSM, moderator
Chris Keegan Beecher Carlson
Jeff Stutzman Wapack Labs
Brad Murlick Navigant

B
(Rose Garden)

Vendor Management

  • What is at risk?
  • The legal landscape
  • Vendor risk by industry
  • Vendor contracts
  • Insurance coverage – key terms and conditions
  • Network assessments
  • Vendor management programs

John Farley HUB, moderator
Bob Parisi Marsh
Adam Cottini Arthur J. Gallagher
Jenny Soubra Allianz
Ernest Koschineg Cipriani & Werner
John Coletti XL Catlin

 


10:15 a.m. | Breakouts

A
(Rose Garden)

The Cloud Providers: Current and Emerging Issues

  • Securing of data going East-West
  • Cloud of SLA issues
  • Outages and reliability
  • Securing hybrid IT

Steve Anderson QBE, moderator
Shawn Carey Keystone NAP
Mark Weatherford vArmour
Michael Ernesto Verizon Advanced Solutions

B
(Ballroom)

Systemic Risk and Aggregation Modeling Systemic Risk

Cloud outage and aggregate effect; zero-day malware; grid outage

Internet brownout; attacks against ‘common network technology’

What are the particular issues to staffing a large-scale incident?

Aggregation Modeling

How models can be used to assess cyber exposures.

What tools and benchmarks can be used to evaluate risk for cyber insurance coverage?

Tim Francis Travelers, moderator
Russ Cohen Chubb
Vikas Shah Milliman
Jay Jacobs Bitsight
Sasha Romanosky RAND Corporation

 

 


11:05 a.m. | Refreshment Break


11:30 a.m. | Compliance: Security Assessments, Training, and Planning

Security assessments

Training

Incident response planning

Learn how to maximize breach response effectiveness and customer satisfaction and minimize litigation and regulatory risks

Best practices for mounting an effective security incident response strategy, including meeting compliance and exceeding customer expectations

Examine what your ethical obligations are to protect consumers and provide identity protection when a data breach hits

Learn how to navigate the legal intricacies and complexities involving security incidents and data breaches

Ted Kobus BakerHostetler, moderator
Jeremy Henley ID Experts
Shawn Melito NPC
Darren Guccione KeeperSecurity
Steve Meckl Symantec
Ondrej Krehel LIFARS


12:30 p.m. | Closing Remarks & Conference Adjourns


Thanks to our sponsors!

Allied WorldMed


Symantec_Horiz_CMYK

CHUBB_Logo_Orange_RGB (1)

 


 

 

 

 

 

 

 

 


[one-thNavigantLogoird] [/one-third]

 

Print

 

 

 

[/one-third/first]