Help

BI’s Article search uses Boolean search capabilities. If you are not familiar with these principles, here are some quick tips.

To search specifically for more than one word, put the search term in quotation marks. For example, “workers compensation”. This will limit your search to that combination of words.

To search for a combination of terms, use quotations and the & symbol. For example, “hurricane” & “loss”.

Login Register Subscribe

Cyber Risk Summit Agenda

Reprints

Sunday, September 27

Evening networking reception &

pre-conference “Solutions Expo”

While networking with colleagues across the country, risk managers and CISO's are invited to meet with cyber risk solution vendors on a one-on-one basis to learn about the products and services available to address cyber risk exposures. Attendees will be asked to make appointments ahead of time for 20-minute consultations, which will occur in conjunction with an opening cocktail and networking reception. Approximately 6-7 vendors will be featured.

Monday, September 28

Networking breakfast

Welcome remarks

Opening keynote

You're not a retailer, but you're still a target

No business is safe from cyber attacks. This session will give risk managers the tools to perform a cyber risk self-assessment by exploring threats such as: interruption of operations and supply chains; security issues stemming from use of the cloud, employee-owned devices (BYOD), and public Wi-Fi; terrorist and state-sponsored hacking; privacy concerns involving wearable devices; social media risks; and unauthorized access via third-party business partners.

Legislative and regulatory landscape

In the wake of the large-scale theft and destruction of data at Sony Pictures Entertainment Inc., President Obama has proposed new federal legislation to combat what he called “the evolving threat of cyber-attacks.” Meanwhile, states have been promoting their own data and security requirements. The result: a patchwork of federal and local legislation and regulations. This session will help risk managers navigate the data privacy and security requirements with which their organizations must comply.

Networking luncheon

Quantifying the impact of a cyber incident

Using data analytics and modeling scenarios derived from actual events, this session will examine the vast array of potential costs to organizations when their systems are hacked. It will go beyond breach notification and response costs and attempt to measure lost income, reputational damage, data destruction and other first-party property damage, costs of defending D&O suits, etc.

Addressing cyber risks: Sometimes insurance isn't enough

The potential scope of cyber risk exposure is reaching $2 trillion. Yet the market for cyber risk insurance is estimated at just $85 billion. This session will report on the latest advances in coverage, provide a market update on new players and available coverage limits, costs, terms and conditions. It will also give risk managers a better handle on risk-transfer options that are available, as well what loss mitigation strategies to contain uninsured losses that occur.

Cyber challenge

In this session, “Jeopardy” meets “Who Wants to Be a Millionaire,” as four risk mangers test their knowledge of cyber risk terminology. All attendees will be invited to participate using electronic polling, which contestants can use as “help from the audience.”

Track the hacker

Months leading up to the Cyber Risk Summit, attendees and BI subscribers have been following clues in the “Track The Hacker” Sweepstakes for a chance to win valuable prizes. The location of the tracker will be revealed and a winner will be announced.

Closing keynote

Closing remarks and cocktail reception