To download available Cyber Risk Summit presentation slides please complete the free registration form on the event Presentations page.
7:30 AM – 7:45 AM | Conference opening remarks and welcome
|
7:45 AM - 8:15 AM | Opening Keynote Speaker: Mike Rogers, U.S. Representative (R-MI) Mr. Rogers was appointed chairman of the intelligence committee in 2011. Regarded as a leader on national security policy, Mr. Rogers is author of the Cyber Intelligence Sharing and Protection Act, which was passed by the House. |
8:30 AM - 9:30AM | Keynote speakers - Dr. Sandor Boyson and Holly Mann Dr. Boyson, research professor and co-director, Supply Chain Management Center for the Robert H. Smith School of Business at the University of Maryland, College Park, and author of the recently released "In Real Time: Managing the New Supply Chain" as well as other highly relevant titles, presenting with Ms. Mann, chief information officer for the University of Maryland's Smith School of Business. |
9:30 AM - 10:30AM | Federal Legislative and Regulatory Developments in Cyber Risk |
At the federal level, lawmakers are becoming increasingly concerned about cyber risks. For example, last year President Barack Obama signed an executive order to strengthen the cyber security of the nation's critical infrastructure and called for the National Institute of Standards and Technology to help develop a cyber security framework for public and private entities to use. That framework was introduced this month. This panel will discuss what does the framework recommend and how practical is it for organizations to adopt. Tom Finan, U.S. Department of Homeland Security Andrew J. Grotto, Senior Adviser for Technology Policy, Department of Commerce Kirstjen Nielsen, Sunesis Consulting LLC Moderator: Mark A. Hofmann, senior editor, Business Insurance | |
10:30 AM - 11:00 AM | Networking Break |
11:00 AM - 12:00 PM | State Legislative & Regulatory Landscape |
States have been promoting their own data privacy and security requirements, creating a patchwork of local legislation and regulations of which businesses have to be aware. The different requirements complicate breach response programs as organizations operating across several states have to comply with several different laws. This panel will discuss the current legislative and regulatory landscape for cyber risks, coming developments and what they mean for organizations. Gene Fishel, Virginia Attorney General's Office Aaron Lancaster, Dickstein Shapiro Thomas McLellan, National Governors Association Moderator: Gavin Souter, editor, Business Insurance | |
12:00 PM - 1:30 PM | Luncheon Keynote Speaker, Shaun Waterman Mr. Waterman, editor of POLITICOPro's just-launched cyber security report for the Politico news organization. He is an award-winning journalist who has worked for the BBC and United Press International; and he's an expert on counterterrorism and cyber security who has presented at leading conferences such as Hacker Halted and the Aspen Security Forum. Waterman, who is British, has a master's degree in social and political sciences from King's College, Cambridge. |
1:30 PM - 2:30 PM | Cyber Terrorism - is U.S. Business and Industry a target? |
The U.S. government has long had concerns about terrorists launching cyber-attacks against government agencies, but there is now a rising concern that the U.S. commercial sector will be targeted by cyber terrorism or cyber espionage attacks. The energy and utilities sector and financial institutions have been viewed as prime targets for cyber-attacks. In addition, various -insurance groups are proposing that cyber terrorism be explicitly covered in a revamped TRIA program if it is renewed this year. This panel will discuss how real is the threat of cyber terrorism and espionage, what industries will likely be targeted and what can they do about to protect themselves, including insurance coverage. Larry Clinton, Internet Security Alliance Jon Iadonisi, White Canvas Group Jake Kouns, Risk Based Security Moderator: Paul Bomberger, managing editor, Business Insurance | |
2:30 PM - 3:30 PM | Managing Cyber Risks—A Team Approach |
Managing cyber risks is more than just an IT issue. Multiple skills are needed to guard against a breach, assess threats, protect organizations in the event of a breach and respond to a breach. How do managers across organizations become involved with cyber protection and how do they work with government and law enforcement entities address the risks. This panel will review strategies for organizations to follow to ensure that they have cyber risk management strategies grounded in 21st century cyber risk management techniques. Jim Halpert, DLA Piper Ethan Harrington, H&R Block Inc. Thomas Kellerman, Trend Micro Moderator: Rodd Zolkos, senior editor, Business Insurance | |
3:30 PM - 4:00 PM | Networking Break |
4:00 PM - 5:00 PM | Are You Covered? |
The uptake of specialty cyber policies has been sluggish as risk managers often have viewed their existing liability policies as providing coverage for cyber risks. The proposed revision of ISO liability forms to include a cyber liability exclusion, however, could severely restrict coverage for cyber risks under standard policies. This panel will discuss the cyber liability exclusion, its effect on the market, review the coverage options available through specialty coverages or possibly captives and how high-profile breaches, such as at Target, have effected cyber risk underwriting. Ben Beeson, Lockton Ron Beiderman, Verisk Insurance Solutions Mark Camillo, AIG Moderator: Judy Greenwald, senior editor, Business Insurance | |
5:00PM - 6:00 PM | Networking Reception |