Schedule/Sessions
Hacker Methods and Motives
- Speakers:
Ken Pyle, CYBIR
Deborah Saunders, Comcast NBCUniversal
This course discusses provides an overview of the ever evolving and increasing sophistication of cyber threat actors. The session will explore the Dark Web and show how easy it is for hackers to purchase nay in formation imaginable. The course will demonstrate where stolen data goes when its be infiltrated from legitimate companies and why companies must deploy state of the art security to prevent customer and employee data from being posted in the Dark Web. The session will provide claims professionals with a better understanding to evaluate the biggest cyber exposures presented to them. The course will provide information about the criminal conduct facilitated by the dark web. The course covers fundamentals of identity theft methods, infiltration of technological safety features, and methods to infiltrate data.
Back to topEmerging Technologies
- Speakers:
Shiraz Saeed, Arch Insurance Group Inc.
Sean Scranton, WTW
This course discusses how the ever-changing landscape of emerging technologies provides both insureds and insurers with opportunities and threats. The course covers crypto currency, blockchain, connected devices (Internet of Things), and drones, and how each of these technologies may deliver enhanced efficiencies, as well as increased risk, for insurance companies and the overall market.
Back to topComplex Coverage Issues: Aggregation, Excess and Reinsurance
- Speakers:
Richard Sheridan, Berkley Cyber Risk Solutions
Jeffrey Weisel, General Re
This course will provide an in-depth look at the more challenging cyber coverage issues facing insurance carriers today. The course will cover the topics of Excess Cyber Policies, Business Interruption Coverage and the potential for Aggregation.
Back to top