BI’s Article search uses Boolean search capabilities. If you are not familiar with these principles, here are some quick tips.

To search specifically for more than one word, put the search term in quotation marks. For example, “workers compensation”. This will limit your search to that combination of words.

To search for a combination of terms, use quotations and the & symbol. For example, “hurricane” & “loss”.

Login Register Subscribe

Cyber Risk Summit Agenda


To download available Cyber Risk Summit presentation slides please complete the free registration form on the event Presentations page.

7:30 AM – 7:45 AM Conference opening remarks and welcome

7:45 AM - 8:15 AMOpening Keynote Speaker: Mike Rogers, U.S. Representative (R-MI)

Mr. Rogers was appointed chairman of the intelligence committee in 2011. Regarded as a leader on national security policy, Mr. Rogers is author of the Cyber Intelligence Sharing and Protection Act, which was passed by the House.

8:30 AM - 9:30AM Keynote speakers - Dr. Sandor Boyson and Holly Mann

Dr. Boyson, research professor and co-director, Supply Chain Management Center for the Robert H. Smith School of Business at the University of Maryland, College Park, and author of the recently released "In Real Time: Managing the New Supply Chain" as well as other highly relevant titles, presenting with Ms. Mann, chief information officer for the University of Maryland's Smith School of Business.

9:30 AM - 10:30AM Federal Legislative and Regulatory Developments in Cyber Risk
 At the federal level, lawmakers are becoming increasingly concerned about cyber

risks. For example, last year President Barack Obama signed an executive order

to strengthen the cyber security of the nation's critical infrastructure and called

for the National Institute of Standards and Technology to help develop a cyber

security framework for public and private entities to use. That framework was introduced

this month. This panel will discuss what does the framework recommend

and how practical is it for organizations to adopt.

Tom Finan, U.S. Department of Homeland Security

Andrew J. Grotto, Senior Adviser for Technology Policy, Department of Commerce

Kirstjen Nielsen, Sunesis Consulting LLC

Moderator: Mark A. Hofmann, senior editor, Business Insurance

10:30 AM - 11:00 AMNetworking Break
11:00 AM - 12:00 PM State Legislative & Regulatory Landscape
 States have been promoting their own data privacy and security requirements,

creating a patchwork of local legislation and regulations of which businesses have

to be aware. The different requirements complicate breach response programs as

organizations operating across several states have to comply with several different

laws. This panel will discuss the current legislative and regulatory landscape

for cyber risks, coming developments and what they mean for organizations.

Gene Fishel, Virginia Attorney General's Office

Aaron Lancaster, Dickstein Shapiro

Thomas McLellan, National Governors Association

Moderator: Gavin Souter, editor, Business Insurance

12:00 PM - 1:30 PMLuncheon Keynote Speaker, Shaun Waterman

Mr. Waterman,

editor of POLITICOPro's just-launched cyber security report for the Politico news organization. He is an award-winning journalist who has worked for the BBC and United Press International; and he's an expert on counterterrorism and cyber security who has presented at leading conferences such as Hacker Halted and the Aspen Security Forum. Waterman, who is British, has a master's degree in social and political sciences from King's College, Cambridge.

1:30 PM - 2:30 PM Cyber Terrorism - is U.S. Business and Industry a target?
 The U.S. government has long had concerns about terrorists launching cyber-attacks

against government agencies, but there is now a rising concern that the U.S.

commercial sector will be targeted by cyber terrorism or cyber espionage attacks.

The energy and utilities sector and financial institutions have been viewed as

prime targets for cyber-attacks. In addition, various -insurance groups are proposing

that cyber terrorism be explicitly covered in a revamped TRIA program if it is

renewed this year. This panel will discuss how real is the threat of cyber terrorism

and espionage, what industries will likely be targeted and what can they do about

to protect themselves, including insurance coverage.

Larry Clinton, Internet Security Alliance

Jon Iadonisi, White Canvas Group

Jake Kouns, Risk Based Security

Moderator: Paul Bomberger, managing editor, Business Insurance

2:30 PM - 3:30 PM Managing Cyber Risks—A Team Approach
 Managing cyber risks is more than just an IT issue. Multiple skills are needed to guard

against a breach, assess threats, protect organizations in the event of a breach and

respond to a breach. How do managers across organizations become involved with

cyber protection and how do they work with government and law enforcement entities

address the risks. This panel will review strategies for organizations to follow

to ensure that they have cyber risk management strategies grounded in 21st century

cyber risk management techniques.

Jim Halpert, DLA Piper

Ethan Harrington, H&R Block Inc.

Thomas Kellerman, Trend Micro

Moderator: Rodd Zolkos, senior editor, Business Insurance

3:30 PM - 4:00 PMNetworking Break
4:00 PM - 5:00 PM Are You Covered?
 The uptake of specialty cyber policies has been sluggish as risk managers often have viewed their existing liability policies as providing coverage for cyber risks. The proposed revision of ISO liability forms to include a cyber liability exclusion, however, could severely restrict coverage for cyber risks under standard policies. This panel will discuss the cyber liability exclusion, its effect on the market, review the coverage options available through specialty coverages or possibly captives and how high-profile breaches, such as at Target, have effected cyber risk underwriting.

Ben Beeson, Lockton

Ron Beiderman, Verisk Insurance Solutions

Mark Camillo, AIG

Moderator: Judy Greenwald, senior editor, Business Insurance

5:00PM - 6:00 PM Networking Reception