Katherine Dawson Varholak

Katherine Dawson Varholak

Sherman & Howard L.L.C.

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Stresscon v. Travelers: A Victory For Policy Holders

Yesterday, the construction and insurance communities received much sought-after guidance from the Colorado Court of Appeals regarding Colorado’s recently adopted bad faith statute in the highly anticipated decision,...more

9/16/2013 - Denial of Benefits Fees Insureds Insurers Notice Prejudice Rule Settlement

Cyber Risk Insurance - Navigating The Application Process

More and more companies are considering specialized cyber insurance policies to insure against cyber breaches. ...more

6/7/2013 - Cyber Insurance Cybersecurity Data Breach Data Protection Insurers

Cyber Risks: Creating A Comprehensive Cyber Insurance Program

Insurance is one important line of defense companies can use to protect against the potentially devastating costs of responding to cyber breaches. The following list gives examples of insurance coverage to consider when...more

3/21/2013 - Cyber Insurance Cybersecurity Data Breach Data Protection First-Party Coverage Third-Party Liability

Update On Coverage For Colorado Construction Defects – TCD & Colorado Pool

Over the past few years, we have monitored the efforts of some in the insurance industry to deny coverage for construction defect claims brought by construction professionals. These insurers' assault on construction...more

2/27/2013 - Commercial General Liability Policies Construction Defects Faulty Workmanship Occurrence

Top Ten Ways To Manage Cyber Risk

This is the second installment of our series on Cyber Risk: Are you Protected? This article highlights the top ten ways to manage cyber risk, including strategies for preventing a cyber breach, creating a response plan in the...more

1/22/2013 - Cyber Attacks Cyber Insurance Cybersecurity Data Breach Privacy Policy Risk Assessment

Cyber Risks: Are You Protected?

As our reliance on technology grows, companies face increasing risk of exposure to cyber breaches. The following outlines some of the risks your business faces and explains why you should implement strategies to manage your...more

12/21/2012 - Cyber Attacks Cybersecurity Data Breach Data Protection Hackers

6 Results
|
View per page
Page: of 1