Schedule/Sessions
Hacker Methods and Motives
This course discusses provides an overview of the ever evolving and increasing sophistication of cyber threat actors. The session will explore the Dark Web and show how easy it is for hackers to purchase nay in formation imaginable. The course will demonstrate where stolen data goes when its be infiltrated from legitimate companies and why companies must deploy state of the art security to prevent customer and employee data from being posted in the Dark Web. The session will provide claims professionals with a better understanding to evaluate the biggest cyber exposures presented to them. The course will provide information about the criminal conduct facilitated by the dark web. The course covers fundamentals of identity theft methods, infiltration of technological safety features, and methods to infiltrate data.
Back to topEmerging Technologies
This course discusses how the ever-changing landscape of emerging technologies provides both insureds and insurers with opportunities and threats. The course covers crypto currency, blockchain, connected devices (Internet of Things), and drones, and how each of these technologies may deliver enhanced efficiencies, as well as increased risk, for insurance companies and the overall market.
Back to topComplex Coverage Issues: Aggregation, Excess and Reinsurance
- Speakers:
Kirsten Mickelson, GB Specialty (Division of Gallagher Bassett)
Carolyn Purwin Ryan, Mullen Coughlin
This course will provide an in-depth look at the more challenging cyber coverage issues facing insurance carriers today. The course will cover the topics of Excess Cyber Policies, Business Interruption Coverage and the potential for Aggregation.
Back to topAnatomy of Cyber Events: Evaluation of First-Party and/or Third-Party Exposures
- Speakers:
Elizabeth Fitch, Righi Fitch Law Group
Theodore Schaer, Zarwin, Baum, DeVito, Kaplan, Schaer & Toddy
This course will evaluate the anatomy of different cyber events, including relevant first-party expenses and/or third-party liability exposures. Learning will take the form of presenting a brief overview of an actual event, utilizing external tools (e.g., social media videos) for educational purposes, engaging in substantive breakout sessions, and participating in a broader group dialog. Specific topics include cyber terrorism, phishing, hacking, and a DDoS Attack.
Back to topSHARED COURSE - Navigating Relationships for Success
The students will be presented with a claim scenario and will be assigned to roles in which they will ask questions of the claims examiner who will be required to respond, make recommendations and identify strategies for navigating these relationships keeping in mind the goal of claim resolution and career success.
Back to topSHARED COURSE - Presentation Skills for Claims Professionals
- Speakers:
Vic Marmo, Marriott Vacations Worldwide Corporation
Rondiene Novitz, Cruser, Mitchell, Novitz, Sanchez, Gaston & Zimet LLP
This course will explore the basics of effective presentations: knowing what you want to create (think “Zen”), delivering value to the audience, focusing on authenticity (rather than form!), the search for a fresh approach and presentation tools (podiums, PowerPoint, Prezi, etc.)
Back to topSHARED COURSE - Principles of Management
This course is designed to be an overview of the major functions of management. Emphasis is on planning, organizing, controlling, directing and communicating. Upon completion, students should be able to work as contributing members of a team utilizing these functions of management.
Back to top