HB Litigation Conferences presents the

NetDiligence® Cyber Risk & Privacy Liability Forum

October 18-19, 2016 | Santa Monica | Welcome reception October 17, 2016

Program Chairs

Oliver Brew Aspen Insurance Group

Steven Anderson QBE

David Lewison AmWins

Andrew ObuchowskiRSM

John Mullen Lewis Brisbois Bisgaard & Smith

Monday, October 17

Welcome Reception

Tuesday, October 18

7:00 a.m. | Registration & Breakfast

8:15 a.m. | Welcome & Opening Remarks

8:45 a.m. |  Cyber Claims & Loss Updates

  • NetDiligence Claims Study
  • Types of claims being covered
  • Examination of cost
  • Claims notice & claims handling

Mark Greisiger NetDiligence
Jeremy Gittler XL Catlin
Chris Novak Verizon


10:00 a.m. | Breakouts

12:30 p.m. | Lunch 

Keynote Speaker:

Joel Brenner

Joel Brenner LLC

Sponsored by:travelerslogo

1:45 p.m.
CISO Objections to the Need for Cyber Coverage

  • CISO Objections to Coverage
  • What does Cyber Insurance cover that even the best security and incident response cannot?
  • Balancing investment in security with other risk management methods.

Jill Salmon Berkshire Hathaway, moderator
Toby Merrill Chubb
Tanya Forsheit Baker Hostetler
Kurt Hagerman Armour
Matt Kletzli Victor O. Schinnerer & Company, Inc.

2:45 p.m. |  Refreshment Break


3:15 p.m. | Breakouts 

4:30 p.m. | Automation and The Next Generation of Cyber Security

  • How to solve the human capital problem
  • Cyber security for the executives
  • How to prepare your evidence and properly engage with law enforcement.
  • Creating velocity and the power of orchestration within security practice
  • How to create real-time legal oversight of cyber security through platform operations
  • How to lower risk, measure risk, and manage risk within an organization.

Joe Loomis CyberSponse, moderator
Aleksandr Yampolskiy Security Scorecard
Carson Zimmerman MITRE
Rohyt Belani PhishMe
Martin Stanley U.S. Department of Homeland Security

5:30 p.m. | Cocktail Reception 


Wednesday, June 8

7:15 a.m. | Registration and Breakfast


8:00 a.m. |  Anatomy of a Data Breach from a Regulator’s Perspective

  • Notice requirements: Are regulators and companies on the same page?
  • Whether and how regulators assist companies with breach response.
  • What do regulators want from companies during investigations?
  • What can companies expect?

Bo Holland AllClear IDmoderator
Patrice Malloy Florida Assistant Attorney General
Gene Fishel Virginia Assistant Attorney General
Nicole DiTomo Pennsylvania Deputy Attorney General

9:05 a.m. | Breakouts


Cyber Risks and Exposure in the Manufacturing Sector

  • Issues of property damage, supply chain & business interruption
  • Operating systems: warranties and upgrades
  • Problems with automation and robots
  • IP resides in manufacturing enclaves that are sometimes hard to control
  • Espionage and ransomware

Andy Obuchowski RSM, moderator
Chris Keegan Beecher Carlson
Jeff Stutzman Wapack Labs
Brad Murlick Navigant

(Rose Garden)

Vendor Management

  • What is at risk?
  • The legal landscape
  • Vendor risk by industry
  • Vendor contracts
  • Insurance coverage – key terms and conditions
  • Network assessments
  • Vendor management programs

John Farley HUB, moderator
Bob Parisi Marsh
Adam Cottini Arthur J. Gallagher
Jenny Soubra Allianz
Ernest Koschineg Cipriani & Werner
John Coletti XL Catlin

10:15 a.m. | Breakouts

(Rose Garden)

The Cloud Providers: Current and Emerging Issues

  • Securing of data going East-West
  • Cloud of SLA issues
  • Outages and reliability
  • Securing hybrid IT

Steven Anderson QBE, moderator
Shawn Carey Keystone NAP
Mark Weatherford vArmour
Michael Ernesto Verizon Advanced Solutions


Systemic Risk and Aggregation Modeling Systemic Risk

Cloud outage and aggregate effect; zero-day malware; grid outage

Internet brownout; attacks against ‘common network technology’

What are the particular issues to staffing a large-scale incident?

Aggregation Modeling

How models can be used to assess cyber exposures.

What tools and benchmarks can be used to evaluate risk for cyber insurance coverage?

Tim Francis Travelers, moderator
Russ Cohen Chubb
Vikas Shah Milliman
Jay Jacobs Bitsight
Sasha Romanosky RAND Corporation

11:05 a.m. | Refreshment Break

11:30 a.m. | Compliance: Security Assessments, Training, and Planning

Security assessments


Incident response planning

Learn how to maximize breach response effectiveness and customer satisfaction and minimize litigation and regulatory risks

Best practices for mounting an effective security incident response strategy, including meeting compliance and exceeding customer expectations

Examine what your ethical obligations are to protect consumers and provide identity protection when a data breach hits

Learn how to navigate the legal intricacies and complexities involving security incidents and data breaches

Ted Kobus BakerHostetler, moderator
Jeremy Henley ID Experts
Shawn Melito NPC
Darren Guccione KeeperSecurity
Steve Meckl Symantec
Ondrej Krehel LIFARS

12:30 p.m. | Closing Remarks & Conference Adjourns

Thanks to our sponsors!