Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.
Event Date | Wed Apr 27 EDT (over 2 years ago) |
Region | All |
Join five world-class experts to sharpen your skill sets and understand emerging issues in the cyber risk universe. The below presentations will be delivered live and online, join us from any location as we explore the cyber risk space. After the presentations, attendees will have a chance to dig deeper into the topic(s) of their choice by joining the speaker(s) in a 10 minute breakout group.
You will learn:
• What is Expected from a Cyber Submission.
• In this session, attendees will identify the steps to submit a cyber submission and be able to:
• Memorize and recall the “CIA Concept’ and how it can prevent information disclosure to unauthorized individuals or systems
• Discover how to train employees for security awareness
• Define the steps on how to protect an organization and mitigate future risk
Physical/Property Damage and its Emergence in Cyber
In this session, attendees will hear more about threat landscapes in cyber and be able to:
• View and assess examples of successful phishing attacks.
• Identify Operational Technology (OT) and its relationship to Information Technology (IT) and impact on the physical world .
• Classify the benefits of IT/OT convergence.
Demystifying Business Interruption
In this session, attendees will learn more about business interruption insurance from a cyber risk perspective and be able to:
• Identify what is covered under a business interruption policy and protect their organizations from catastrophic events .
• State the reason why business interruption claims have skyrocketed in the cyber insurance market in the past 5 years.
• Find out how small and large companies are battling the increasing risk of ransomware attacks.
Risk management, Technology and the Future of Cyber Insurance
In this session, attendees will learn how risk management technology is the future of cyber insurance and be able to:
• Identify the 6 parts of a typical ransomware attack.
• Discover how CTF Underwriting works with customer data to detect malware infections across a portfolio.
• Look at systemic vulnerabilities like ProxyShell, ProxyLogon and Log4j as well as less publicized but higher impact ones.
2022 Speakers
Jacqueline Spencer-Sim
Divisional Director Cyber, Hamilton
Michael Shen
Head of Cyber & Technology, Canopius Group
Camilla Walker
Cyber Underwriter, Canopius Group
Paul Gooch
Underwriter, Tokio Marine Kiln Group Limited
Tom Bennett
Team Leader, Cyber Threat Analysis, CTF Underwriting