Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
The Standard Formula Podcast | Dissecting the Solvency Capital Requirement
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
The Standard Formula Podcast | Solvency II Back to Basics: Technical Provisions
D&O Insurance Myths (Part 2)
Hinshaw Insurance Law TV | Bad Faith Law
The Standard Formula Podcast | Investment Rules for Insurers and Reinsurers
D&O Insurance Myths (Part 1)
The Standard Formula Podcast | Understanding the UK’s Matching Adjustment Regime
The Standard Formula Podcast | Solvency II Back to Basics: Third Country Branches and Cross-Border Provision of Services
Standard Formula Podcast | Reinsurance and Risk Transfer: Risk Mitigation Under the Solvency II Regime
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
The Risk Roundtable: Demystifying the Intersection Between NJ Workers' Comp & Employment Practice Liability
GILTI Conscience Podcast | Tax Insurance 101
Insurance for the Cannabis Industry: Risks & Challenges
The Standard Formula Podcast | International Association of Insurance Supervisors: Who They Are and Their Industry Impact
Crypto Offerings Launch by Major Investment Bank, Asset Manager and Insurer - According to a recent report, a major multinational investment bank and financial services firm is now allowing its investment advisors to pitch...more
This is a deceptively simple question — risk managers rightfully expect to know the scope of their coverages when they build their insurance programs. Unfortunately, judicial interpretation of common policy terms can turn...more
Your company was hacked. You feel panic, embarrassment, anger, fear and confusion. But you must act quickly, logically and decisively to stop the bleeding and protect your business, your customers and your employees. The good...more
Followers of the cyber insurance market over the past two years may be suffering from whiplash—that’s how dramatically the market shifted from 2022 to 2023. A perfect storm of good trends and facts combined to create a soft...more
Policyholders have options when it comes to war exclusions in cyber insurance policies, a focus area for insurers following recent cyberattacks. Key Points: ..Insurers have asserted that war exclusions may preclude...more
Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still...more
In the second of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management, and Bryan Schauer, Vice President at The Schauer Group’s...more
The U.S. District Court for the Eastern District of Pennsylvania ruled that an insurance policy issued by Federal Insurance Co. excluded coverage for the transmission of $1.3 million by the insured in response to an email...more
The frequency and severity of cyber incidents, particularly ransomware attacks targeting businesses and critical infrastructure organizations, have been on the increase and are unlikely to subside anytime soon. Higher claim...more
The T-Mobile Data Breach is One You Can’t Ignore - "Hackers claim to have obtained the data of 100 million people—including sensitive personal information." Why this is important: Earlier this week, reports began...more
As cybercrimes and data breaches continue to cause significant damage to companies of all types, policyholders are looking to their various insurance policies for coverage to help weather the storm and recoup losses. A recent...more
Nearly 700 years ago, England captured King John II of France and held him for ransom for four million écus. But France could not afford to pay, and King John II ultimately traded his two sons as substitute hostages to try...more
We have all heard about the alarming and ever increasing number of security breaches and ransomware attacks facing businesses. With bad actors continuously evolving and presenting new risks, most companies now fortunately...more
In G&G Oil Company of Indiana Inc. v. Continental Western Insurance Co., the Indiana Supreme Court considered the emerging area of computer crime coverage. ...more
In our March Insurance Update, we discuss four state supreme court cases and four cybercrime cases. The state high courts address: •From whose perspective should a consent-to-settle provision be judged? •What standard...more
This episode is a continuation of Lynda’s conversation with Bridget Choi, Deputy Counsel and Managing Director of Strategy at Kivu Consulting, and David Anderson, VP within Lockton Insurance’s Cyber Technology Group, about...more
Following a 2013 data breach in which the credit and debit card information of more than 110 million customers was stolen or exposed, Target Corp. sought coverage from its CGL insurers for $74 million that it incurred in...more
The New York Department of Financial Services issued a cybersecurity fraud alert (“Alert”) to all regulated entities, particularly those utilizing public-facing websites that display nonpublic information (“NPI”), even if...more
Sometimes a comprehensive overview is needed to recognize that individual anomalous conduct is indicative of a criminal scheme. Recently, the Department of Financial Services (DFS) looked at an unusual pattern of interaction...more
In this month's edition, we examine the Court of Justice of the European Union's decision invalidating the EU-U.S. Privacy Shield framework, as well as the U.S. government's response to the decision. We also examine two...more
The current COVID-19 pandemic has forced many businesses online in order to survive. In many cases, businesses had no plans to be online. Others were forced to move online more quickly than planned. In order to assist these...more
Cyberattacks are an increasingly frequent and costly risk faced by almost every business today. While the availability and scope of cyber-specific insurance has developed exponentially over the past few years, it is important...more
Companies of all sizes have fallen victim to attacks whereby fraudsters will use deceptive communications, such as spoofed emails, to trick an employee into transferring money into the fraudsters’ control. While these...more
Hackers who targeted airport currency exchange mainstay Travelex in a ransomware attack on New Year’s Eve have alerted British media that they possess 5 GB of sensitive customer data from the company “since gaining access to...more
It is an all-too-common dilemma. As phishing schemes have become more prevalent and more sophisticated, businesses of all sizes have fallen victim to these attacks where a fraudster will use a spoofed email or other deceptive...more