Course description
Cyber Risk Insurance Policies: Is Your Company Covered?
Gain a better understanding of the threat landscape, including emerging trends in cyber attacks.
This course will provide practical information and advice regarding obtaining and preserving insurance coverage for a cyberdata breach, including a ransomware incident. The material will provide an overview of the threat landscape, including emerging trends in cyber attacks. Our presenters will address the core terms of coverage under and limitations of a typical cyber policy, as well as other types of policies that may provide coverage for a cyberrelated loss, including advice for negotiating optimal coverage. They will discuss coverage for secondary risks that frequently result from a cyberdata breach and review how risk managers, inhouse lawyers, IT and audit professionals, and security officers can preserve coverage in the event of a breach and protect the companys bottom line. To help illustrate these points, they will draw upon and share multiple realworld examples from their legal practice.
Do you work at this company and want to update this page?
Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.
Upcoming start dates
Who should attend?
This live webinar is designed for presidents, vice presidents, accountants, controllers, CFOs, compliance officers, tax managers, records managers, IT managers, network administrators, CIOs, insurance professionals, and attorneys.
Training content
The Current Cyber/Data Breach/Privacy Threat Landscape
- Common Threats Historically
- New Trends
- Ransomware
- Working From Home
- Vendor Risks
- Combinations of Several Threats
Risks Covered by Common Cyber Liability Policies
- Core Coverage Grants
- Common Exclusions
- Highlight War Exclusion
- Highlight on Coverage for Ransomware Attacks and Common Coverage Issues
- Potential Restrictions on Coverage for Ransom Payments
- Business Interruption Ramifications
Other Types of Policies That May Respond to Cyber Risks
- First-Party Property
- Kidnap and Ransom
- Commercial General Liability
Insurance for Secondary Risks Resulting From a Cyber Attack
- Secondary Risks
- Consumer Class Action Suits/Regulatory Investigations
- Shareholder/Event-Driven Derivative Actions
- Other Policies to Consider
- Directors and Officer
- Professional Liability/Errors and Omissions
Risk Management Best Practices Regarding Cyber/Data Breach
- Holistic Review: Understand All Insurance Program Policies
- Which Policies Could Potentially Respond to a Loss
- Policies Notice Requirements
- Other Insurance Issues
- Risk Management Should Be Part of the Incident Response Plan, and Legal/IT/Security Should Have at Least a Basic Familiarity With What Coverage the Company Maintains and How It May Be Triggered
Certification / Credits
Credits: CLE,CPE
Learning Objectives
- You will be able to discuss the current cyberdata breach threat landscape.
- You will be able to recognize risks covered by cyber risk policy.
- You will be able to identify insurance for secondary risks resulting from cyberdata breach.
- You will be able to describe other types of policies that may respond to cyber risks.
Contact this provider
Lorman Education Services - Live and On-Demand Courses
Lorman Education Services is a leading provider of online professional development and corporate training for organizations and individual professionals. For more than 30 years, Lorman has delivered relevant, high-quality, professional-level courses that cover a broad range of business and technical...