While the market for cyber insurance continues to grow dramatically, there still is no standardized form of cyber insurance policy language, and the actuarial challenges of measuring and gauging the impact of a cyber-attack make it difficult to match a cyber insurance policy with the unique risk profiles of today’s public and private companies.
This webcast presents detailed, practical means of managing this challenge by analyzing and scrutinizing the typical cyber-incident response workflow that follows most cyber-attacks. The webcast will examine — before any cyber-attack occurs — which workflow costs will trigger coverage, which workflow costs will be outside of coverage, and which workflow costs might be uninsurable.
This webcast draws and expands upon a detailed, comprehensive article co-authored by our panelists. This just-released article, which is the first of its kind, is available here.
Please join John Reed Stark, President of John Reed Stark Consulting LLC, and David R. Fontaine, Executive Vice President, Chief Legal & Administrative Officer and Corporate Secretary of Altegrity as they address these issues and your questions in this free, one-hour webcast.
To attend this webcast (the live version is scheduled for Wednesday, June 10, 2015, at 1 pm Eastern), please register below. [***Please note date change for this webcast]