Schedule/Sessions
Foundations of Privacy 201
This course discusses how technology creates the security and trust that serves as the foundation of privacy. The course covers fundamentals of identity and access management, cryptography, and network security, and then discusses the security and trust elements of three key Internet technologies – scripts, cookies, and the cloud – and how they can be misused to threaten privacy on the Internet.
Back to topBest Practices in Integration of Cyber Underwriting and Claims
This course will provide recommendations to maximize the benefits of collaboration between the claims and underwriting functions in the Cyber insurance context. With Cyber including pre-breach services, post-breach services, liability coverage and first party coverage, integration of efforts between claims and underwriting will benefit the insurer, customers, producers and the industry as a whole. The course will discuss the various stages of cyber underwriting and claims management, as well as describe the steps a company can take to develop best practices to enhance a culture of collaboration.
Back to topPrivacy in the Professional Service and Financial Institution Sector(s)
This course will provide a detailed and targeted overview of evolving cyber threats and exposures facing both the professional service and financial industries. The course will cover how weaker security can offer an entry into client systems and a means for cybercriminals to penetrate confidential information such as financial information, PHI and PII. These sectors are diverse and businesses have the duty to safeguard their client’s data; therefore organization must adopt the use of firewalls, data encryption, monitoring, and other controls to ensure confidential information stays safe to avoid liability and manage risk. This course will also address federal and state regulations, the need for firms to keep up with changes in the law, and inherent technology risks. This course will expose claims adjusters and risk managers to industry specific exposures, data breach claim trends, and provide aid when analyzing professional and cyber liability coverages.
Back to topBusiness Interruption and Contingent Business Interruption
This course will the emerging technology of IOT and the implications that the IOT has for liability claims handling. The course explain what is the Internet of Things and describe the current IOT devices being used by manufacturing, transportation, health care, small businesses, and consumers. The course will cover wearable technology, telematics, and ingestibles. The course will cover security risks associated with the use of IOT devices and the legal implications arising out of the use and hacking of IOT devices. The course will also cover the use of IOT devices in investigations and how IOT interfaces with two other emerging technologies artificial intelligence and blockchain.
Back to topCritical Infrastructure
This course will provide a general overview of risk management and exposures for the industrial, transportation and education sectors. The course will cover general regulations that pertain to these industries with respect to data security. The course will cover the unique nature of these sectors in terms of data security protection, and what makes them attractive to criminals. Certain specific industries will be discussed including oil and gas, manufacturing and the internet of things. The course will cover areas of transportation that have been and will continue to be targets for security compromise including, infrastructure, driverless vehicles and mass transit. The course will cover the rise of data breach incidence in higher education and the reasons behind this. The course will also generally cover considerations that are taken into account when underwriting risks in these sectors and claims handling in these unique sectors.
Back to topPrivacy and the Health Care Sector
This course will provide an overview of the current and evolving cyber threats and exposures facing the health care provider and managed care industries. The course will also address relevant state and federal health care privacy and security laws; how they differ and can impact the handling of a health care cyber claim. This course will discuss the unique cyber insurance coverage and privacy notification and remedy requirements for the health care industry. Finally, this review will cover the regulatory bodies that enforce the federal and state laws applicable to these industries, as well as recent enforcement actions and likely agendas going forward under the new administration.
Back to topCyber Event Table Top Exercise
- Speakers:
Kirsten Mickelson, GB Specialty (Division of Gallagher Bassett)
Carolyn Purwin Ryan, Mullen Coughlin
This course will provide an opportunity to practically apply the information students have been learning throughout Claims College through a cyber loss table top exercise. This is a hands-on course which will simulate a real life cyber event and will allow students to immerse themselves in the various issues that arise during the life of a breach and learn how to successfully apply their knowledge to the scenario as it develops.
Back to topComplex Coverage: Gaps, Overlap and Coordination
This course will begin with a discussion of how cyber risks and exposures have impacted the Insurance Market as a whole. More specifically, how the creation and evolution of stand-alone cyber insurance products have impacted, and continue to impact, traditional insurance products. We will examine how the dynamic nature of cyber risk and the evolution of the stand-alone cyber products is causing coverage gaps and overlap. The course will identify common coverage gaps and areas of overlap and will review methods used by brokers and underwriters to coordinate coverage. We will also discuss coverage and claim handling challenges associated with the gaps, overlap and coordination.
Back to top