PLUS Cyber University
Agenda
Join us live for PLUS Cyber University to explore ransomware, business email compromise, and cyber risks shaping the insurance market. Sessions cover privacy foundations, evolving cyber coverage, and the interplay with traditional policies.
Privacy and Cybersecurity Factual and Legal Foundations – Part 1
Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an…
Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an overview of applicable laws and regulations.
Privacy and Cybersecurity Factual and Legal Foundations – Part 2
Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an…
Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an overview of applicable laws and regulations.
Non-Cyber Line of Coverage, Evolution of Cyber Coverage, and Interplay Among Lines
Learn about coverage for privacy and cyber risks under various traditional policies and the evolution of so-called “cyber” coverages, highlighting the types of provisions offered for first- and third-party coverage. We will then consider how a single loss may…
Learn about coverage for privacy and cyber risks under various traditional policies and the evolution of so-called “cyber” coverages, highlighting the types of provisions offered for first- and third-party coverage. We will then consider how a single loss may implicate different lines of coverage.

Debunking Myths about Cyber Insurance
This session will discuss many of the misperceptions about cyber insurance that contribute to what are still relatively low adoption rates in certain industries. We will explore some of these myths as well as counter-arguments to utilize when making…
This session will discuss many of the misperceptions about cyber insurance that contribute to what are still relatively low adoption rates in certain industries. We will explore some of these myths as well as counter-arguments to utilize when making the business case for entities adding cyber insurance to their risk management portfolios.
Underwriting, Breach Response, 1st Party Incidents, 3rd Party Claims, and Emerging Coverages
This session will provide a broad overview of the state of the market, basic and evolving coverages, and claims. Learn the background basics of these points as well as emerging issues and products in this evolving marketplace.
Risk Management and How Business Leaders Prepare and Respond
Cyber, Privacy and security risks are not just a task for the IT department to tackle. These are enterprise risks and require a task force within an organization. In this session we will hear from a risk manager and…
Cyber, Privacy and security risks are not just a task for the IT department to tackle. These are enterprise risks and require a task force within an organization. In this session we will hear from a risk manager and a Chief Information Security Officer on how they manage these risks, communicate and plan.
Breach Scenario: Surviving a Cybersecurity Incident
This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of…
This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of follow up is necessary.
Cyber Roundtable: Trends, Risks, and Emerging Issues
Our roundtable experts will discuss common cyber risks and emerging exposures that should be on any cyber insurance professional’s radar. This session will also explore the role of the policy holder and insurers as it relates to mitigating cyber…
Our roundtable experts will discuss common cyber risks and emerging exposures that should be on any cyber insurance professional’s radar. This session will also explore the role of the policy holder and insurers as it relates to mitigating cyber risks and the current state of the cyber insurance market.

