SCHEDULE OF EVENTS
Monday, April 15, 2019
State of the Union Part I: Understanding the Threat Horizon
State of the Union Part II: The Global Regulatory Landscape
Large-scale data breaches are increasingly in the public eye; consumer trust in brands is faltering, creating a surge in data and privacy protection discussions from the Boardroom to the front lines. While the European Union’s General Data Protection Regulation (GDPR) has occupied much of the spotlight since coming into effect in May, globally there has been a barrage of privacy laws like the California Consumer Privacy Act that was passed in June and the breach-reporting amendments to PIPEDA came into force on November 1st. What do these and the plethora of other privacy regulations mean for your organization when it comes to protecting an individual’s personal data?
Cocktail Reception Sponsored by Slice
Tuesday, April 16, 2019
The CISO Perspective: A Fireside Chat
Leading CISOs and security practitioners handling real-world challenges will share insights in this roundtable session on security trends, compliance, risk management, and effectively communicating risks and solutions in terms that will resonate with corporate stakeholders. Thought leaders from Webroot, Dell and RSA will discuss how to effectively consume information in the quick-paced security-threat landscape, prioritize execution plans, enable risk management and quantification as variables for decision-making, and how to properly balance compliance programs with routine and unscheduled security fires.
Concurrent Session A - Pulling Back the Curtain: The Future of Cyber Insurance
2017 was arguably the most financially devastating year to date for companies who experienced a cyber breach. Around the world, these incidents resulted in the loss of billions in market capital, the firing or resignation of CISO’s and CEO’s and large scale government investigations. In a 2018 global survey by the Ponemon Institute, IT security practitioners were more pessimistic than in past years about their ability to protect their organizations from cyber security threats. Yet, despite this apparent increase in the frequency and severity of cyber losses, the cyber insurance market has continued to grow and evolve. This session will consist of a candid conversation concerning the state of the cyber insurance market, the evolution of underwriting cyber risk, the convergence of coverage, and cyber claim trends. More specifically, we will talk through key considerations in building an effective insurance portfolio (including information about the limitations of insurance), dispel the myths concerning coverage and claims, and share our insights from both an underwriting and broking perspective.
Concurrent Session B - Corralling Cyber Operational Risk Controls and Measurement: GRI and FAIR Institute
There’s an old saying in marketing that “Half of your marketing dollars are wasted. You just don’t know which half.” Given the common state of cyber risk measurement practices today, you have to wonder whether the same is true of cyber-related controls. In this session, the panel will discuss some of the challenges that currently limit our profession's ability to identify and focus on the things that matter most, or understand the value of our controls. It will also discuss some of the misperceptions and challenges regarding cyber risk measurement that inhibit broader adoption of better risk measurement methods, and steps you can take to help make a difference.
Co-founder and Executive VP, Research & Development, Risklens and Creator of Factor Analysis of Information Risk (FAIR)
Lunch and Keynote Presentation Sponsored by AIG
Mitigating Cyber Risk with Technology: What You Need to Consider
There are scores of technology options for cyber protection but how should an organization go about deciding what is the right technology option for its enterprise and risk profile? Our panel will discuss this issue from a user's perspective, providing a framework for looking at how businesses should approach procurement decisions around cybersecurity technology and the available options.
Concurrent Session A - Success and Failure: Lessons Learned from Recent Breaches and ISAC Success Stories, a Conversation
Organizations are constantly battling the onslaught of threat actors attacking their information assets. It has become best practice to work on improving incident response processes on an ongoing basis. Once breached, however, each situation is different and no matter how well you are prepared, things never go as planned. Alexander Rau, Senior Manager with Mandiant, and Rob Labbé, Director of Information Security at Teck Resources, will jointly discuss some of the lessons learned from publicly disclosed breaches to highlight key insights in possible improvements to processes, procedures during an incident response as well as third party engagement. As the co-founder of the MM-ISAC (Mining and Metals Information Technology Information Sharing and Analysis Center), Rob Labbé will also share the advantages of being a member of an ISAC and the benefits of information sharing, training and staff development, working groups and collaboration that come from working with other organizations within your industry.
Concurrent Session B - Actuarial Perspectives on Cyber Pricing/Reserving/Aggregation Management, a Conversation
A Cyber Actuary and a Cyber Security Expert Walk into a Bar… Any discussion of cyber risk modeling usually starts with complaints about the evolving threat and scarcity of data. Thus far, actuaries have approached cyber risk with caution, even as the cyber insurance market has grown rapidly around them. Meanwhile, a small number of cyber security experts have taken steps to understand cyber insurance with the aim to establish a quantitative foundation for managing cyber risk. Join us for a conversation between two such individuals as they explore the tough questions and share their insights around cyber aggregation risk, silent cyber exposure, risk selection, reinsurance, and cyber catastrophe events, to name a few.
Two Technologies: The Quantum and Blockchain Cyber Steam Trains - Swot Analysis
Quantum and Blockchain have gathered much attention in recent years due to their potential as intensely disruptive technologies. Unfortunately, what they really are and what their real impact could be is often misunderstood. The advent of scalable quantum computers will put at risk our current use of public-key cryptography to secure Internet communications and otherwise support our digital economy. This potentially devastating effect requires us to plan and put in place risk mitigation strategies for this so-called "post-quantum era". However, quantum computing is not expected to bring significant changes in our ability to tackle hard computational problems nor lead to breakthroughs in Artificial Intelligence, for example. On the other hand, the use of blockchains has the potential to create distributed applications in the absence of a trusted third-party. This has vast-reaching implications in many sectors of our economy such as currency, banking, real-estate, supply chain, transport and even management. However, the use of distributed ledgers whose integrity is protected by blockchain technology can be inefficient, and in application domains where a trusted authority exists or is required it might not be an optimal solution to manage trust. So is blockchain the answer for managing trust in a post-quantum world? Well, it depends... This panel will address this and related questions, with the more general aim of demystifying Quantum and Blockchain, what they are, how they are related, what it really means to all of us in the future.
Cyber vs. Privacy: What are the differences? Why does it matter?
This panel will discuss the blurring lines between cyber security and privacy management both in terms of operations and regulatory requirements for leading organizations. What is the role of the CISO? And the Chief Privacy Officer? Many see these roles as merging, but should they? Are risk and liability reduced or compounded by a merged role? And what happens in the event of a crisis where the one function judges the other? Join the discussion and debate as this esteemed panel looks at real life crisis, how they were managed, and the outlook going forward under regulations such as GDPR, PIPEDA, and the California Consumer Privacy Act. From the opening views of ICRMC on the cyber threat and regulatory landscape, the panel closes ICRMC by making it real, with takeaways relevant to your organization.