Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Cyber Insurance - An Essential Component to Your Business
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
The Significance of Operational Technology in Cyber Insurance Underwriting – Part 2
The Downstream Impact of Ransomware on Cyber Insurance Underwriting – Part 1
Coverage Considerations for Ransomware & Cyber Attacks
Cyber Insurance Changes in the Aftermath of Log4j
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
How Patching log4J Can Mitigate Regulatory and Insurance Issues
Wait, that’s covered? Insurability of Fines and Penalties Flowing From a Cybersecurity Breach
Takeaways From Recent Claims Against Mark Zuckerberg and Facebook – Mitigating the Heightened Risk of Privacy Suits Against Individual Directors and Officers
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Ransomware and Cyber Insurance: The good, the bad, and why your insurance data is a target for hackers (with Jacob Ingerslev)
Debra Geroux and Scott Wrobel on Responding to Data Breaches
Cyber Insurance Coverage Market: A House of Cards or Temporary Plateau?
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Nota Bene Episode 114: The New Global Business of Cyberattack, from Ransomware to a Now-Ubiquitous State of Breach with Kari Rollins
The Ransomware Attack Part 2 – How To Respond When The Enemy Overcomes The Gates
In Part I of this series, we posed a series of questions to consider when purchasing cyber insurance. Our approach was deliberate: the right questions help get you the right insurance to address cyber risks facing your...more
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
The decision to integrate Generative AI (“GAI”) into an organization is one that occupies significant space these days in many corporate board rooms. In today’s rapidly evolving business landscape, the adoption of GAI...more
Some policyholders mistakenly assume that all cyber insurance policies provide coverage for much the same type of losses. But unlike many other types of commercial insurance, cyber has not become standardized in the years...more
A Minnesota federal district court has held that a software company is entitled to coverage for losses related to diverted billing emails under its business interruption coverage, rejecting the insurer’s argument that the...more
Kidnapping, treasure hunts, insurgents shooting down airplanes — sounds like the Fall TV lineup. But no, it’s our October Insurance Update. And in honor of the month’s most treasured sporting event, the Fall Classic, we...more
While cyber was incorporated in some general liability policies (GL) of the 1980s, the first cyber standalone policy was written in 1997 through AIG. Though groundbreaking, as it was the first to address cybersecurity, it was...more
Energy companies in the power and oil and gas sectors are leading targets of cyberattacks, as threats to critical infrastructure systems continue to rise. A 2021 report by a third-party cyberrisk company found that a quarter...more
Over the past several years, if your organization experienced a cyberattack, such as ransomware or a diversion of funds due to a business email compromise (BEC), and you had cyber insurance, you likely were very thankful....more
Continued widespread cyber attacks have leaders in just about every industry wary and watchful, and insurance underwriters are no exception. Given the increase in claims from recent ransomware attacks, cyber insurers are...more
Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more
Each month, Nossaman's complimentary Employment BUZZ webinar series covers a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more
The Biden administration has hit the ground running with executive orders, regulatory and legislative priorities, and cabinet-level and other top posts being announced on a daily basis. Our public policy colleagues have been...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the Seventh Circuit's ruling finding standing for an Illinois Biometric Information Privacy Act claim, the European Data Protection Board's updated...more
While most of society struggles to flatten the curve, treat the sick and restart the economy, regrettably, some bad actors have used the COVID-19 emergency as an opportunity to exploit vulnerabilities for personal gain. One...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
We want to enable our personnel to work from home during this health crisis. What do we need to worry about from a privacy and cybersecurity perspective? 1.Equipment. Personnel working remotely will need equipment, and you...more
As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
When the California Consumer Privacy Act (“CCPA”) takes effect in January 2020, California will become the first state to permit residents whose personal information is exposed in a data breach to seek statutory damages of...more
An obscure niche product less than a decade ago, cyber insurance is now a staple of many companies’ risk transfer programs. Its rise in prominence is no wonder. High-profile data breaches have caused businesses millions of...more
Last week, Hurricane Michael devastated the Florida Panhandle. The hurricane was the third strongest to strike the United States and the largest to ever make landfall on the Florida Panhandle. Some of Florida’s most historic...more
Due to the dramatic increase and changing nature of cyber risks, mergers and acquisitions due diligence should expand to address cyber risks, available risk mitigation practices, and available insurance. Acquiring companies...more
Allianz’s yearly survey of nearly 2,000 risk experts from 80 countries highlights business interruption and cyber incidents as the top two major threats for companies through 2018 and beyond. Forty-two percent of responses...more