Cyber Risk Insurance Policies: Is Your Company Covered? (OnDemand Webinar)

$99.00

SKU: 409736EAU

Description

Gain a better understanding of the threat landscape, including emerging trends in cyber attacks.This course will provide practical information and advice regarding obtaining and preserving insurance coverage for a cyberdata breach, including a ransomware incident. The material will provide an overview of the threat landscape, including emerging trends in cyber attacks. Our presenters will address the core terms of coverage under and limitations of a typical cyber policy, as well as other types of policies that may provide coverage for a cyberrelated loss, including advice for negotiating optimal coverage. They will discuss coverage for secondary risks that frequently result from a cyberdata breach and review how risk managers, inhouse lawyers, IT and audit professionals, and security officers can preserve coverage in the event of a breach and protect the company’s bottom line. To help illustrate these points, they will draw upon and share multiple realworld examples from their legal practice.

Date: 2022-05-11 Start Time: End Time:

Learning Objectives

The Current Cyber/Data Breach/Privacy Threat Landscape
• Common Threats Historically
• New Trends
• Ransomware
• Working From Home
• Vendor Risks
• Combinations of Several Threats

Risks Covered by Common Cyber Liability Policies
• Core Coverage Grants
• Common Exclusions
• Highlight War Exclusion
• Highlight on Coverage for Ransomware Attacks and Common Coverage Issues
• Potential Restrictions on Coverage for Ransom Payments
• Business Interruption Ramifications

Other Types of Policies That May Respond to Cyber Risks
• First-Party Property
• Kidnap and Ransom
• Commercial General Liability

Insurance for Secondary Risks Resulting From a Cyber Attack
• Secondary Risks
• Consumer Class Action Suits/Regulatory Investigations
• Shareholder/Event-Driven Derivative Actions
• Other Policies to Consider
• Directors and Officers
• Professional Liability/Errors and Omissions

Risk Management Best Practices Regarding Cyber/Data Breach
• Holistic Review: Understand All Insurance Program Policies
• Which Policies Could Potentially Respond to a Loss
• Policies’ Notice Requirements
• Other Insurance Issues
• Risk Management Should Be Part of the Incident Response Plan, and Legal/IT/Security Should Have at Least a Basic Familiarity With What Coverage the Company Maintains and How It May Be Triggered

CLE (Please check the Detailed Credit Information page for states that have already been approved) ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

J. Andrew Moss-Reed Smith LLP, Noel C. Paul – Reed Smith LLP