Project Description
Estimates as to the true cost of cybercrime and cyber espionage vary widely according to which report you read but what is clear is that cyber crimes will often go unreported as companies attempt to conceal losses in order to protect brand and reputation. Conversely, many organisations are being breached on a daily basis and remain blissfully unaware that they have fallen victim to an attack since they have no means to detect them.
With a large majority of companies having either insufficient or no cyber insurance in place at all, the risk of catastrophic financial damage to both small and large enterprises alike is extremely high. Yet many organisations are unclear what they are buying with many off-the-shelf cyber insurance policies being a long way off from covering all costs associated with breaches, companies need to understand what an effective policy looks like, what they are covered for and where they are still exposed.
Cyber Insurance – what companies need to know will educate companies on the current cyber threats affecting organisations today and will equip them with the knowledge they need to select the most appropriate policies for protecting their businesses, assets and reputation. It will assist companies in evaluating their own needs by asking such questions as:
- Does your organisation have the people or experience to effectively manage a data breach incident?
- How should your organisation decide whether investment in cyber insurance should be part of your security strategy?
- Ahead of impending legislation, how can your organisation reduce the significant costs resulting from a data breach incident?
Who should attend
- Security managers and advisors
- IT experts
- Risk managers and consultants
- Insurance buyers
- Insurance professionals
- Private practice lawyers and in-house counsel
- Anyone wanting a better understanding of
- where their organisation may be vulnerable to cyber risks
Benefits of attending
- Evaluate what a good cyber insurance policy looks like
- Understand the ramifications of a serious data breach and how it could affect your organisation
- Gain insight into whether your workforce could be opening the door to IP thieves
- Learn what you are covered for and where there are gaps
- Question experts in a relaxed environment on the round table discussion groups
- Evaluate the third party risks posed to your organisation through your supply chain
- Gain insight into social media profiling and corporate liability
Session One. The Risks. | |
08.15 | Refreshments, registration and exhibition |
08.55 | Conference organiser`s opening remarks |
09.00 | Welcome from the Chair |
09.10 | The Current Threat Landscape PDF Presentation
|
09.35 | An Insurance buyers perspectives
|
10.00 | Securing your supply chain and vicarious liability
|
10.25 | Cloud computing – the perceived and real risks
|
10.50 | Questions |
11.00 | Refreshment Break |
Session Two: THE GOVERNMENT | |
11.25 | Government guidance for business on tackling cyber threats Giles Smith, Deputy Director for Cyber Security and Resilience, Department for Business, Innovation and Skills (BIS) |
Session Two: CYBER INCIDENT AND BREACH SCENARIOS | |
12.05 | This session will analyses a range of scenarios focusing on cyber related incidents and their predicted outcomes. A panel of experts will discuss and debate the potential threat and resulting losses to first and third parties, including potential laws which would come into effect, how the losses might be quantified and the extent to which insurance could compensate. The audience will be invited to participate throughout the session with questions.
|
13.00 | Lunch |
Session Four: INSURANCE | |
14.00 | PANEL SESSION: What is being sold and what trends are emerging in buying habits?
|
14.45 | PANEL SESSION:What claims and losses are arising and how are these impacting the companies involved?
|
15.15 | What changes should companies be implementing ahead of the EU’s data protection regulation and how will this impact the insurance market?
|
15.20 | Questions |
15.30 | Refreshment Break |
Session Five: ROUNDTABLE SESSIONS | |
16.10 | Ten round-table sessions will take place simultaneously. The round table sessions are designed to encourage discussion in smaller groups on a range of topics. Delegates will participate in 2 thirty minute round table discussions during the course of 1 hour |
17.10 | Chair’s closing remarks |
17.15 | Close of conference |

Peter Warren
Cyber Security Research Institute

Laurent Heslault
Chief Security Strategy, Symantec

John Hurrell
Chief Executive, Airmic

Ollie Whitehouse
Technical Director, NCC Group

Giles Smith
Deputy Director for Cyber Security and Resilience, Department for Business, Innovation and Skills (BIS)

Raj Samani
VP, CTO, McAfee EMEA

Dan Solomon
Director - Cyber Security Services, Optimal Risk

Chris North
Head of Information, Security, Gazprom Marketing and Trading

Dan Trueman
Head of Cyber, Novae Group

Lisa Hansford Smith
Senior Underwriter, Cyber, Tech & Media, XL Catlin

Richard Hodson
Head of Technology, Arthur J. Gallagher

Phil Mayes
Head of Technology and Cyber Underwriting, ANV

Rossella Bollini
Beazley Group

Ben Hobby FCA
Dip CII, Director, RGL Forensics

Jillian Raw
Partner, Kennedys

Hans Allnutt
Partner, DAC Beachcroft

Sandra Cole
UK & International Claims Counsel, Beazley

Brett Warburton-Smith
Partner, Lockton Companies LLP

Darren Argyle, CISO
Markit

Ilia Kolochenko, CEO
High-Tech Bridge SA

Graeme McGowan
Optimal Risk Management
Holiday Inn London – Regent’s Park Hotel lies in a leafy and cosmopolitan area of central London and is the perfect place for you to stay:
- Just a 10-minute walk from bustling Oxford Street, the boutiques of Regent Street and the style of Carnaby Street
- The hotel is easily accessible if travelling from Paddington, Euston or the Eurostar at Kings Cross St Pancras International Station, London Heathrow Airport is only 45 minutes away by taxi
- You can leave your car in our NCP managed car park beneath the hotel as we are located just a 1 minute walk from the closest tube station which is Great Portland Street on the Circle Tube Line, Metropolitan Tube Line and Hammersmith & City Tube Line
- Also in very close proximity are the Victoria, Northern, Jubilee and Bakerloo Tube Lines
If you click on this link here you will be able to book a hotel room if needed.
Alternatively, if you would like assistance with your hotel booking you can contact Jessica Heili, our dedicated concierge. If you email Jessica with your requirements, phone number and quoting Special Reference Code W-M3R59 to Jessica_Heili@HotelMap.com she will get back to you to discuss your hotel options.