Latest Posts › Cybersecurity

Share:

“Keeping Track” of Your Cyber (and Other) Coverage Part II

On this episode of Don't Take No for An Answer, host, Lynda A. Bennett, Partner and Chair of Lowenstein’s Insurance Recovery Group, is joined by David Anderson, Vice President, Cyber Liability at Woodruff Sawyer, and Heather...more

“Keeping Track” of Your Cyber (and Other) Coverage Part I

In this episode of “Don't Take No for an Answer,” host Lynda A. Bennett is joined by David Anderson, Vice President of Cyber at Woodruff Sawyer, and Heather Weaver, counsel in Lowenstein’s Insurance Recovery Group, to discuss...more

London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the... [Audio]

Lloyd’s of London’s new requirement that all insurers issuing standalone cyber coverage exclude liability for any state backed cyber-attacks could present a systemic risk to the insurance market, raising questions of coverage...more

The Significance of Operational Technology in Cyber Insurance Underwriting – Part 2 [Audio]

In this episode of “Don’t Take No for an Answer,” Robert DiRico, National Cyber Liability Practice Leader at ARC Excess & Surplus, LLC, and Shiraz Saeed, Vice President and Cyber Risk Product Leader at Arch Insurance Group,...more

The Downstream Impact of Ransomware on Cyber Insurance Underwriting – Part 1 [Audio]

Host Lynda A. Bennett is joined by Robert DiRico, National Cyber Liability Practice Leader at ARC Excess & Surplus, LLC, and Shiraz Saeed, Vice President and Cyber Risk Product Leader at Arch Insurance Group, for a deep dive...more

Cyber Insurance Changes in the Aftermath of Log4j [Video]

In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more

Subrogation Actions Following Ransomware Claims: What Policyholders Should Expect in the Ever-Changing Cyber Insurance Market

Ransomware attacks continue to challenge U.S. companies, with cybercriminals now routinely extorting companies for multimillion-dollar payouts. A company that experiences an attack will likely seek coverage under its cyber...more

Wait, that’s covered? Insurability of Fines and Penalties Flowing From a Cybersecurity Breach [Audio]

Despite the great strides companies have made to mitigate the risks associated with security breaches, including putting insurance in place to cover those risks, cyber criminals have remained two steps ahead, finding new and...more

Ransomware Case Signifies Shift In Cyber Insurers' Stance

Ransomware attacks are on the rise. Lax security measures, which have become more acute in the work-from-home environment, continue to be exploited. Companies' systems are hacked into, their data is encrypted, and they face...more

Riding the Wave of Cyber Insurance Claim Payments: A Trend Cresting or Crashing?

Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more

Cyber Insurance Coverage Market: A House of Cards or Temporary Plateau? [Audio]

We have all heard about the alarming and ever increasing number of security breaches and ransomware attacks facing businesses. With bad actors continuously evolving and presenting new risks, most companies now fortunately...more

The Ransomware Attack Part 2 – How To Respond When The Enemy Overcomes The Gates [Audio]

This episode is a continuation of Lynda’s conversation with Bridget Choi, Deputy Counsel and Managing Director of Strategy at Kivu Consulting, and David Anderson, VP within Lockton Insurance’s Cyber Technology Group, about...more

The Ransomware Attack Part 1 – How To Keep The Enemy At The Gates [Audio]

In this episode, Lynda is joined by Bridget Choi, Deputy Counsel and Managing Director of Strategy at Kivu Consulting, and David Anderson, VP within Lockton Insurance’s Cyber Technology Group, to discuss the current state of...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide