Project Description

Register here

Estimates as to the true cost of cybercrime and cyber espionage vary widely according to which report you read but what is clear is that cyber crimes will often go unreported as companies attempt to conceal losses in order to protect brand and reputation. Conversely, many organisations are being breached on a daily basis and remain blissfully unaware that they have fallen victim to an attack since they have no means to detect them.

With a large majority of companies having either insufficient or no cyber insurance in place at all, the risk of catastrophic financial damage to both small and large enterprises alike is extremely high. Yet many organisations are unclear what they are buying with many off-the-shelf cyber insurance policies being a long way off from covering all costs associated with breaches, companies need to understand what an effective policy looks like, what they are covered for and where they are still exposed.

Cyber Insurance – what companies need to know will educate companies on the current cyber threats affecting organisations today and will equip them with the knowledge they need to select the most appropriate policies for protecting their businesses, assets and reputation. It will assist companies in evaluating their own needs by asking such questions as:

  • Does your organisation have the people or experience to effectively manage a data breach incident?
  • How should your organisation decide whether investment in cyber insurance should be part of your security strategy?
  • Ahead of impending legislation, how can your organisation reduce the significant costs resulting from a data breach incident?

Who should attend

  • Security managers and advisors
  • IT experts
  • Risk managers and consultants
  • Insurance buyers
  • Insurance professionals
  • Private practice lawyers and in-house counsel
  • Anyone wanting a better understanding of
  • where their organisation may be vulnerable to cyber risks

Benefits of attending

  • Evaluate what a good cyber insurance policy looks like
  • Understand the ramifications of a serious data breach and how it could affect your organisation
  • Gain insight into whether your workforce could be opening the door to IP thieves
  • Learn what you are covered for and where there are gaps
  • Question experts in a relaxed environment on the round table discussion groups
  • Evaluate the third party risks posed to your organisation through your supply chain
  • Gain insight into social media profiling and corporate liability

Session One. The Risks.
08.15Refreshments, registration and exhibition
08.55Conference organiser`s opening remarks
09.00Welcome from the Chair
09.10The Current Threat Landscape

PDF Presentation

  • Major IT trends
  • Cyber-risk evolution
  • Attackers, targets & objectives
  • Vulnerabilities, impacts & Consequences
  • Challenges around sharing breach and security data
  • From Cyber-dependence to Cyber-Resilience
    Laurent Heslault, Director, Security Strategist, Symantec
09.35An Insurance buyers perspectives

  • Which exposures are of most concern to insurance and risk managers?
  • What does the insurance market offer to protect against these risks and where are the gaps?
    John Hurrell, Chief Executive, Airmic
10.00Securing your supply chain and vicarious liability

  • What is an information classification system and why are more companies using them?
  • Evaluating third party risks posed to your IT network
  • Assessing the provision and limits of cover throughout your supply chain
  • Challenges around unencrypted media in the control of your suppliers
  • Analysing your culture of interacting with suppliers and customers and determining ‘at risk’ behaviour’
  • What does a good security and risk assessment look like when vetting third parties?
    Ollie Whitehouse, Technical Director, NCC Group
10.25Cloud computing – the perceived and real risks

  • The benefits and risks of cloud computing and how this is still evolving
  • Hacking the cloud and security breaches
  • Inadequate recovery or loss of leaked data
  • What risk management precautions should be considered when implementing cloud computing?
    Craig Balding, Managing Director, Group Head of Cyber Security Risk, Barclays
11.00Refreshment Break
11.25Government guidance for business on tackling cyber threats

Giles Smith, Deputy Director for Cyber Security and Resilience, Department for Business, Innovation and Skills (BIS)
12.05This session will analyses a range of scenarios focusing on cyber related incidents and their predicted outcomes. A panel of experts will discuss and debate the potential threat and resulting losses to first and third parties, including potential laws which would come into effect, how the losses might be quantified and the extent to which insurance could compensate. The audience will be invited to participate throughout the session with questions.

  • Scenario One – Cyber criminals monitor traffic during an M&A
  • Scenario Two – A public sector organisation fails to manage a data security breach incident
  • Scenario Three – The impact of a long-term data breach accessed via an unencrypted portable device used by a travelling employee
  • Scenario Four – Social media liability risk
  • Scenario Five – The implications of a major cloud provider losing all data
Session Four: INSURANCE
14.00PANEL SESSION: What is being sold and what trends are emerging in buying habits?

  • How is the insurance market evolving to keep pace with changing cyber threats?
  • What does an effective cyber insurance policy look like?
  • How is policy wording changing?
  • Differentiating standard business risks from cyber insurable risks
  • The scope for custom designing cover
  • Who is making cyber cover purchasing decisions?
  • Security controls which will reduce your premium
  • What measures are expected of companies to reduce their risk?
  • At what point could your organisation’s computer security be classed as negligent?
  • Fines and penalties
  • What separates competitive insurers?
  • The future of the cyber insurance market
    Lisa Hansford Smith, Senior Underwriter, Cyber, Tech & Media, XL Catlin
    Richard Hodson, Head of Technology, Arthur J. Gallagher
14.45PANEL SESSION:What claims and losses are arising and how are these impacting the companies involved?

  • Which cyber security incidents have had the most profound impact on claimant and insurer to date?
  • How is the market likely to respond to a substantial cyber attack?
    Phil Mayes, Head of Technology and Cyber Underwriting, ANZ
    Rossella Bollini, Senior International Underwriter, Beazley
    Ben Hobby, Director, RGL Forensics
    Jillian Raw, Partner, Kennedys
15.15What changes should companies be implementing ahead of the EU’s data protection regulation and how will this impact the insurance market?

  • What impact is mandatory breach reporting likely to have on uninsured companies?
    Hans Allnutt, Partner, DAC Beachcroft
    Sandra Cole, UK & International Claims Counsel, Beazley
15.30Refreshment Break
16.10Ten round-table sessions will take place simultaneously. The round table sessions are designed to encourage discussion in smaller groups on a range of topics. Delegates will participate in 2 thirty minute round table discussions during the course of 1 hour
17.10Chair’s closing remarks
17.15Close of conference

Peter Warren

Peter Warren

Cyber Security Research Institute

View More
Laurent Heslault

Laurent Heslault

Chief Security Strategy, Symantec

View More

John Hurrell

Chief Executive, Airmic

View More

Ollie Whitehouse

Technical Director, NCC Group

View More
Giles Smith

Giles Smith

Deputy Director for Cyber Security and Resilience, Department for Business, Innovation and Skills (BIS)

View More
Raj Samani

Raj Samani


View More
Dan Solomon

Dan Solomon

Director - Cyber Security Services, Optimal Risk

View More

Chris North

Head of Information, Security, Gazprom Marketing and Trading

View More
Dan Trueman

Dan Trueman

Head of Cyber, Novae Group

View More
Lisa Hansford Smith

Lisa Hansford Smith

Senior Underwriter, Cyber, Tech & Media, XL Catlin

View More
Richard Hodson

Richard Hodson

Head of Technology, Arthur J. Gallagher

View More
Phil Mayes

Phil Mayes

Head of Technology and Cyber Underwriting, ANV

View More

Rossella Bollini

Beazley Group

View More
Ben Hobby

Ben Hobby FCA

Dip CII, Director, RGL Forensics

View More

Jillian Raw

Partner, Kennedys

View More
Hans Allnutt

Hans Allnutt

Partner, DAC Beachcroft

View More

Sandra Cole

UK & International Claims Counsel, Beazley

View More

Brett Warburton-Smith

Partner, Lockton Companies LLP

View More

Darren Argyle, CISO


View More

Ilia Kolochenko, CEO

High-Tech Bridge SA

View More

Graeme McGowan

Optimal Risk Management

View More

Holiday Inn London – Regent’s Park Hotel lies in a leafy and cosmopolitan area of central London and is the perfect place for you to stay:

  • Just a 10-minute walk from bustling Oxford Street, the boutiques of Regent Street and the style of Carnaby Street
  • The hotel is easily accessible if travelling from Paddington, Euston or the Eurostar at Kings Cross St Pancras International Station, London Heathrow Airport is only 45 minutes away by taxi
  • You can leave your car in our NCP managed car park beneath the hotel as we are located just a 1 minute walk from the closest tube station which is Great Portland Street on the Circle Tube Line, Metropolitan Tube Line and Hammersmith & City Tube Line
  • Also in very close proximity are the Victoria, Northern, Jubilee and Bakerloo Tube Lines

If you click on this link here you will be able to book a hotel room if needed.

Alternatively, if you would like assistance with your hotel booking you can contact Jessica Heili, our dedicated concierge. If you email Jessica with your requirements, phone number and quoting Special Reference Code W-M3R59 to she will get back to you to discuss your hotel options.


Cyber Risk and Insurance programme



Produced by:

Contego Events
Holiday Inn London - Regent's Park, Carburton St, London W1W 5EE, UK