BI’s Article search uses Boolean search capabilities. If you are not familiar with these principles, here are some quick tips.
To search specifically for more than one word, put the search term in quotation marks. For example, “workers compensation”. This will limit your search to that combination of words.
To search for a combination of terms, use quotations and the & symbol. For example, “hurricane” & “loss”.
To download available Cyber Risk Summit presentation slides please complete the free registration form on the event Presentations page.
|7:30 AM – 7:45 AM||Conference opening remarks and welcome|
|7:45 AM - 8:15 AM||Opening Keynote Speaker: Mike Rogers, U.S. Representative (R-MI) |
Mr. Rogers was appointed chairman of the intelligence committee in 2011. Regarded as a leader on national security policy, Mr. Rogers is author of the Cyber Intelligence Sharing and Protection Act, which was passed by the House.
|8:30 AM - 9:30AM||Keynote speakers - Dr. Sandor Boyson and Holly Mann|
Dr. Boyson, research professor and co-director, Supply Chain Management Center for the Robert H. Smith School of Business at the University of Maryland, College Park, and author of the recently released "In Real Time: Managing the New Supply Chain" as well as other highly relevant titles, presenting with Ms. Mann, chief information officer for the University of Maryland's Smith School of Business.
|9:30 AM - 10:30AM||Federal Legislative and Regulatory Developments in Cyber Risk|
|At the federal level, lawmakers are becoming increasingly concerned about cyber|
risks. For example, last year President Barack Obama signed an executive order
to strengthen the cyber security of the nation's critical infrastructure and called
for the National Institute of Standards and Technology to help develop a cyber
security framework for public and private entities to use. That framework was introduced
this month. This panel will discuss what does the framework recommend
and how practical is it for organizations to adopt.
Tom Finan, U.S. Department of Homeland Security
Andrew J. Grotto, Senior Adviser for Technology Policy, Department of Commerce
Kirstjen Nielsen, Sunesis Consulting LLC
Moderator: Mark A. Hofmann, senior editor, Business Insurance
|10:30 AM - 11:00 AM||Networking Break|
|11:00 AM - 12:00 PM||State Legislative & Regulatory Landscape|
|States have been promoting their own data privacy and security requirements,|
creating a patchwork of local legislation and regulations of which businesses have
to be aware. The different requirements complicate breach response programs as
organizations operating across several states have to comply with several different
laws. This panel will discuss the current legislative and regulatory landscape
for cyber risks, coming developments and what they mean for organizations.
Gene Fishel, Virginia Attorney General's Office
Aaron Lancaster, Dickstein Shapiro
Thomas McLellan, National Governors Association
Moderator: Gavin Souter, editor, Business Insurance
|12:00 PM - 1:30 PM||Luncheon Keynote Speaker, Shaun Waterman|
editor of POLITICOPro's just-launched cyber security report for the Politico news organization. He is an award-winning journalist who has worked for the BBC and United Press International; and he's an expert on counterterrorism and cyber security who has presented at leading conferences such as Hacker Halted and the Aspen Security Forum. Waterman, who is British, has a master's degree in social and political sciences from King's College, Cambridge.
|1:30 PM - 2:30 PM||Cyber Terrorism - is U.S. Business and Industry a target?|
|The U.S. government has long had concerns about terrorists launching cyber-attacks|
against government agencies, but there is now a rising concern that the U.S.
commercial sector will be targeted by cyber terrorism or cyber espionage attacks.
The energy and utilities sector and financial institutions have been viewed as
prime targets for cyber-attacks. In addition, various -insurance groups are proposing
that cyber terrorism be explicitly covered in a revamped TRIA program if it is
renewed this year. This panel will discuss how real is the threat of cyber terrorism
and espionage, what industries will likely be targeted and what can they do about
to protect themselves, including insurance coverage.
Larry Clinton, Internet Security Alliance
Jon Iadonisi, White Canvas Group
Jake Kouns, Risk Based Security
Moderator: Paul Bomberger, managing editor, Business Insurance
|2:30 PM - 3:30 PM||Managing Cyber Risks—A Team Approach|
|Managing cyber risks is more than just an IT issue. Multiple skills are needed to guard|
against a breach, assess threats, protect organizations in the event of a breach and
respond to a breach. How do managers across organizations become involved with
cyber protection and how do they work with government and law enforcement entities
address the risks. This panel will review strategies for organizations to follow
to ensure that they have cyber risk management strategies grounded in 21st century
cyber risk management techniques.
Jim Halpert, DLA Piper
Ethan Harrington, H&R Block Inc.
Thomas Kellerman, Trend Micro
Moderator: Rodd Zolkos, senior editor, Business Insurance
|3:30 PM - 4:00 PM||Networking Break|
|4:00 PM - 5:00 PM||Are You Covered?|
|The uptake of specialty cyber policies has been sluggish as risk managers often have viewed their existing liability policies as providing coverage for cyber risks. The proposed revision of ISO liability forms to include a cyber liability exclusion, however, could severely restrict coverage for cyber risks under standard policies. This panel will discuss the cyber liability exclusion, its effect on the market, review the coverage options available through specialty coverages or possibly captives and how high-profile breaches, such as at Target, have effected cyber risk underwriting.|
Ben Beeson, Lockton
Ron Beiderman, Verisk Insurance Solutions
Mark Camillo, AIG
Moderator: Judy Greenwald, senior editor, Business Insurance
|5:00PM - 6:00 PM||Networking Reception|