Data Privacy and Cybersecurity Due Diligence in M&A Deals

Size: px
Start display at page:

Download "Data Privacy and Cybersecurity Due Diligence in M&A Deals"

Transcription

1 Presenting a live 90-minute webinar with interactive Q&A Data Privacy and Cybersecurity Due Diligence in M&A Deals Identifying Vulnerabilities, Drafting Data-Related Provisions in M&A Agreements, Post-Acquisition Data Integration Considerations THURSDAY, OCTOBER 9, pm Eastern 12pm Central 11am Mountain 10am Pacific Today s faculty features: Roberta D. Anderson, Partner, K&L Gates, Pittsburgh Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J. Gerard M. Stegmaier, Partner, Goodwin Procter, Washington, D.C. The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions ed to registrants for additional information. If you have any questions, please contact Customer Service at ext. 10.

2 Tips for Optimal Quality FOR LIVE EVENT ONLY Sound Quality If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection. If the sound quality is not satisfactory, you may listen via the phone: dial and enter your PIN when prompted. Otherwise, please send us a chat or sound@straffordpub.com immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.

3 Continuing Education Credits FOR LIVE EVENT ONLY For CLE purposes, please let us know how many people are listening at your location by completing each of the following steps: In the chat box, type (1) your company name and (2) the number of attendees at your location Click the SEND button beside the box If you have purchased Strafford CLE processing services, you must confirm your participation by completing and submitting an Official Record of Attendance (CLE Form). You may obtain your CLE form by going to the program page and selecting the appropriate form in the PROGRAM MATERIALS box at the top right corner. If you'd like to purchase CLE credit processing, it is available for a fee. For additional information about CLE credit processing, go to our website or call us at ext. 35.

4 Program Materials FOR LIVE EVENT ONLY If you have not printed the conference materials for this program, please complete the following steps: Click on the ^ symbol next to Conference Materials in the middle of the lefthand column on your screen. Click on the tab labeled Handouts that appears, and there you will see a PDF of the slides for today's program. Double click on the PDF and a separate page will open. Print the slides by clicking on the printer icon.

5 Privacy & Data Security in M&A Transactions Gerard M. Stegmaier Partner 2013 Goodwin Procter LLP

6 6

7 7

8 Fiduciary Duties of Directors Goodwin Procter LLP 8

9 Class Action Lawsuits Goodwin Procter LLP 9

10 Employee Privacy Goodwin Procter LLP 10

11 Due Diligence The process of asking questions and assessing and quantifying risk in order to allocate it intentionally. Goodwin Procter LLP 11

12 Principal Risk Areas Liability Reputation Integration Goodwin Procter LLP 12

13 Managing Risk Identify Risk Shift Risk Mitigate Risk Accept Risk Goodwin Procter LLP 13 13

14 Asset Acquisitions: Common Features Buyer purchases some or all assets of the Target Neither ownership nor existence of Target is affected (i.e., Target shareholders continue to own their stock) Goodwin Procter LLP 14

15 Stock Acquisitions: Common Features Buyer purchases stock of the Target from the Target s shareholders All of the assets and liabilities of the Target remain with the Target (which is owned by Buyer post-closing) Because liabilities are acquired as well, due diligence and contractual protections should be more comprehensive, BUT fewer third party consents will be likely Goodwin Procter LLP 15

16 Merger One company is merged with and into another, which is the Survivor All assets and liabilities of the merged company succeed to, and are held by, the Survivor Goodwin Procter LLP 16

17 Common Merger Types Direct merger Forward triangular merger Reverse triangular merger Goodwin Procter LLP 17

18 Common Negotiation Considerations Knowledge Materiality Laws Personal Information Remedies Goodwin Procter LLP 18

19 8 Questions for Privacy Pros in Transactions What is the relationship between the diligence information sought and the transaction (both now and in the future)? Do I know what the deal is about and what my clients care about (or should care about)? Am I being a problem solver rather than a problem spotter or administrator? Is privacy material in this deal? How? Do I know why this matters? Goodwin Procter LLP 19

20 8 Questions for Privacy Pros in Transactions What effect do qualifiers such as knowledge or MAE have on diligence? On the seller s representations and risk allocations? Should identified issues or risks be included on disclosure schedules? What tools are available to manage privacy risks to help the parties complete a transaction? Escrows? What information may be most helpful to facilitate integration after the transaction closes and who will inherit whatever is learned? Goodwin Procter LLP 20

21 GERARD M. STEGMAIER, ESQ., PARTNER Contact Information: 901 New York Avenue, NW Washington, DC Goodwin Procter LLP 21

22 Data Privacy and Cyber Security Due Diligence in M&A Deals Alan Brill, CISSP, CFE, CIPP/US, FAAFS October 9, Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

23 1 The Problem: Why has Cyber Become So Important? A Quick Introduction 23 Data Privacy and Data Cybersecurity Privacy and Cybersecurity Due Diligence in Due M&A Diligence Deals in Alan M&A Briill Deals Alan Briill

24 When you or your client wants to Expand into a new business area Increase market share Neutralize competition Improve technology and systems Acquire a new customer base or BI data WHAT CYBER RISKS ARE YOU BUYING OR INVESTING IN? 24 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

25 You Want to Know (BEFORE, not After.) September, 2013 February, Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

26 You Want to Know (BEFORE, not After.) August, 2014 September, Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

27 What s the Cyber Risk in an M&A Transaction Theft of intellectual property and trade secrets? Loss of sensitive business information and strategies? Loss of customer / employee data and damages to reputation and employee / consumer confidence? Litigation and compliance risks? Remedial expenditures? Loss of shareholder value? (Not counting compromise of data on the deal itself!) 27 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

28 2 Kroll s Experience and Advice 28 Data Privacy and Data Cybersecurity Privacy and Cybersecurity Due Diligence in Due M&A Diligence Deals in Alan M&A Briill Deals Alan Briill

29 Kroll s Approach to the M&A Cyber Challenge At all stages of the deal process, there is a continuum of cyber-risk management need. Phase 1: Target risk evaluation Identify key InfoSec risk facing business Set up team to review data and processes Phase 2: Deal and response diligence Deal diligence on key players and assets Technical response review of assurances Phase 3: Pre closing network diligence Endpoint Threat Monitoring and analysis Security controls review Phase 4: Post purchase implementation Incident response planning incident Table top exercise (TTX) 29 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

30 Phase 1. Target Evaluation Identify the InfoSec risks facing the target Data risks Regulatory risk Develop the data security team involvement Identification of integration issues and constraints Define roles with transaction team Implement secure communications approach Identify outside expertise needs 30 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

31 Phase 2: Pre-Signature Development of diligence approach Kroll diligence workup on key players and corporate assets Assistance to review technical InfoSec reporting on pre-signing actions: Covenants, representations, and warranties Licenses, vendors, business associates Indemnification, limits, and basket Divestment triggers Avoidance of knowledge qualifiers Use of Material Adverse Security Effect 31 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

32 Phase 3: Pre-Closing Endpoint Threat Monitoring and Analysis Used to understand how the enterprise controls unknown software inside its environment o Not just looking for known malware Review all binaries and processes that exhibit behavior similar to malware: location, signature, network connections, persistence Review all running binaries and processes Corroborate patching processes and find significant vulnerabilities o A two week process 32 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

33 Phase 3: Pre-Closing Security Controls Review Determine whether the target is actually implementing key measures to protect against persistent targeted attacks Review the governance and structure of the target s InfoSec response 33 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

34 Phase 4: Post-Closing Integration TTX Review information response plan ID and brief changes Interview key stakeholders Develop scenarios Deliver TTX with old and new teams 34 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

35 In Summary It is a brave new world, and cyber risks present an emerging risk to value and liability in mergers, acquisitions and investment transactions You will never invest in a house without an appropriate inspection Information security involvement as part of the deal team is key Technical solutions designed to identify and report on InfoSec risks in a relevant way, and that provides value through each phase of the transaction, is of significant value in due diligence 35 Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

36 Alan Brill, CISSP, CFE, CIPP/US, FAAFS Senior Managing Director Kroll Cyber Security & Investigations T Data Privacy and Cybersecurity Due Diligence in M&A Deals Alan Briill

37 Data Privacy and Cybersecurity Due Diligence in M&A Deals The Importance of Insurance Coverage Roberta D. Copyright 2013 by K&L Gates LLP. All rights reserved. October 9, 2014

38 AGENDA The Importance Of Timing What To Look For In An Insurance Audit Potential Coverage Under Legacy Policies Limitations Of Legacy Insurance Policies Cutting Edge Cyber Insurance M&A Insurance Provisions A Word About Vendor Contracts 38

39 THE IMPORTANCE OF TIMING 39 Copyright 2013 by K&L Gates LLP. All rights reserved.

40 THE IMPORTANCE OF TIMING Advanced Attacks Go Undiscovered For A Median 229 Days A Merger/Acquisition May Close Before The Attack Is Discovered Resulting In Substantial Post-Closing Liability 40

41 WHAT TO LOOK FOR IN AN INSURANCE AUDIT 41 Copyright 2013 by K&L Gates LLP. All rights reserved.

42 POTENTIAL COVERAGE UNDER LEGACY POLICIES 42 Copyright 2013 by K&L Gates LLP. All rights reserved.

43 POTENTIAL COVERAGE UNDER LEGACY POLICIES Directors and Officers (D&O) Errors and Omissions (E&O)/Professional Liability Employment Practices Liability (EPL) Fiduciary Liability Crime Property? Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa., 691 F.3d 821 (6th Cir. 2012) (DSW covered for expenses for customer communications, public relations, lawsuits, regulatory defense costs, and fines imposed by Visa and Mastercard under the computer fraud rider of its blanket crime policy) Commercial General Liability (CGL)? 43

44 POTENTIAL COVERAGE UNDER LEGACY POLICIES Coverage B provides coverage for damages because of personal and advertising injury Personal and Advertising Injury is defined in part as injury arising out of [o]ral or written publication, in any manner, of material that violates a person s right of privacy What is a Person s Right of Privacy? What is a Publication? 44

45 LIMITATIONS OF LEGACY INSURANCE POLICIES 45 Copyright 2013 by K&L Gates LLP. All rights reserved.

46 LIMITATIONS OF LEGACY INSURANCE POLICIES ISO states that when this endorsement is attached, it will result in a reduction of coverage due to the deletion of an exception with respect to damages because of bodily injury arising out of loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data. 46

47 LIMITATIONS OF LEGACY INSURANCE POLICIES 47

48 LIMITATIONS OF LEGACY INSURANCE POLICIES cv cv 48

49 CUTTING EDGE CYBER INSURANCE 49 Copyright 2013 by K&L Gates LLP. All rights reserved.

50 back klgates.com 50

51 CUTTING EDGE CYBER INSURANCE Privacy And Network Security Provides coverage for liability (defense and indemnity) arising out of data breaches, transmission of malicious code, denial of third-party access to the insured s network, and other network security threats Regulatory Liability Provides coverage to deal with regulators and liability arising out of administrative or regulatory investigations, proceedings, fines and penalties Crisis Management Media Liability Provides coverage for forensics experts to determine the cause of the breach, notify individuals whose PII may have been compromised, call centers, ID theft monitoring, PR and other crisis management activities Provides coverage for liability (defense and indemnity) for claims alleging invasion of privacy, libel, slander, defamation, infringement of IP rights (not patent), and other web-based acts (e.g., improper deep-linking) 51

52 CUTTING EDGE CYBER INSURANCE Network Interruption And Extra Expense (and CBI) Coverage lost business income and extra expense caused by malicious code, DDoS attacks, unauthorized access to, or theft of, information, and other security threats to networks (e.g., a website goes down and orders cannot be taken). Information Asset Coverage Extortion Coverage for damage to or theft of the insured s own systems and hardware, and may cover the cost of restoring or recreating stolen or corrupted data. Coverage for losses resulting from extortion (payments of an extortionist s demand to prevent network loss or implementation of a threat). Emerging Market For First-Party Property Damage Emerging Market For Third-Party Bodily Injury and Property Damage Coverage 52

53 CUTTING EDGE CYBER INSURANCE Defense And Indemnity For Claims Regulatory Defense, Fines And Penalties Crisis Management 53

54 54

55 55

56 BEWARE THE FINE PRINT 56

57 M&A INSURANCE PROVISIONS 57 Copyright 2013 by K&L Gates LLP. All rights reserved.

58 M&A INSURANCE PROVISIONS 58

59 M&A INSURANCE PROVISIONS 59

60 M&A INSURANCE PROVISIONS ***** 60

61 A WORD ABOUT VENDOR CONTRACTS 61 Copyright 2013 by K&L Gates LLP. All rights reserved.

62 A WORD ABOUT VENDOR CONTRACTS Be specific Who is responsible for securing stored data? Data in motion? Reference objective standards, e.g., Version 5 of the SANS Institute Critical Security Controls Who has access and to which parts to various parts of the organizations network? What are the required cybersecurity standards? Dovetail Vendor Contracts With Insurance Contracts 62

63 Linkedin: robertaandersonesq Insurance Thought Leadership 63

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Roberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J.

Roberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J. Presenting a live 90 minute webinar with interactive Q&A Data Privacy and Cybersecurity Due Diligence in M&A Deals Identifying Vulnerabilities, Drafting Data Related Provisions in M&A Agreements, Post

More information

Insurance Due Diligence in M&A Deals: Evaluating Coverage and Gaps, Mitigating Risks and Potential Liabilities

Insurance Due Diligence in M&A Deals: Evaluating Coverage and Gaps, Mitigating Risks and Potential Liabilities Presenting a live 90-minute webinar with interactive Q&A Insurance Due Diligence in M&A Deals: Evaluating Coverage and Gaps, Mitigating Risks and Potential Liabilities THURSDAY, OCTOBER 29, 2015 1pm Eastern

More information

How To Listen To A Conference On A Computer Or Cell Phone

How To Listen To A Conference On A Computer Or Cell Phone Presenting a live 90-minute webinar with interactive Q&A M&A Auctions: Successful Bidding Strategies Planning and Executing Winning Bids, Minimizing Costs of Losing Bids THURSDAY, JANUARY 8, 2015 1pm Eastern

More information

for Landlords and Tenants Negotiating Insurance, Indemnity and Mutual Waiver of Subrogation Provisions

for Landlords and Tenants Negotiating Insurance, Indemnity and Mutual Waiver of Subrogation Provisions Presenting a live 90 minute webinar with interactive Q&A Commercial Leases: Risk Mitigation Strategies for Landlords and Tenants Negotiating Insurance, Indemnity and Mutual Waiver of Subrogation Provisions

More information

Cyber Insurance What is it? Should your bank purchase it? Roberta D. Anderson Partner, K&L Gates LLP roberta.anderson@klgates.

Cyber Insurance What is it? Should your bank purchase it? Roberta D. Anderson Partner, K&L Gates LLP roberta.anderson@klgates. Cyber Insurance What is it? Should your bank purchase it? Roberta D. Anderson Partner, K&L Gates LLP roberta.anderson@klgates.com March 8, 2016 AGENDA Spectrum of Cyber Risk Cutting Edge Cyber Insurance

More information

Payment and Performance Surety Bonds in Construction Projects: Perspectives of Owners, Contractors and Sureties

Payment and Performance Surety Bonds in Construction Projects: Perspectives of Owners, Contractors and Sureties Presenting a live 90-minute webinar with interactive Q&A Payment and Performance Surety Bonds in Construction Projects: Perspectives of Owners, Contractors and Sureties Asserting and Defending Surety Bond

More information

CYBER 3.0. CUTTING-EDGE ADVANCEMENTS IN INSURANCE COVERAGE FOR CYBER RISK AND REALITY SFOR005 Speakers:

CYBER 3.0. CUTTING-EDGE ADVANCEMENTS IN INSURANCE COVERAGE FOR CYBER RISK AND REALITY SFOR005 Speakers: CYBER 3.0 CUTTING-EDGE ADVANCEMENTS IN INSURANCE COVERAGE FOR CYBER RISK AND REALITY SFOR005 Speakers: Roberta D. Anderson, Partner, K&L Gates LLP Timothy Flaherty, Manager, Insurance Risk Management,

More information

ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures

ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures Presenting a live 90-minute webinar with interactive Q&A ERISA Retirement Plans: Fiduciary Compliance and Risk Management for Investment Fund Selection and Fee Disclosures Discharging Fiduciary Duties

More information

Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More

Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More Presenting a live 90-minute webinar with interactive Q&A Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More TUESDAY, SEPTEMBER 16, 2014

More information

Builder's Risk Insurance for Construction Projects: Legal Issues

Builder's Risk Insurance for Construction Projects: Legal Issues Presenting a live 90-minute webinar with interactive Q&A Builder's Risk Insurance for Construction Projects: Legal Issues Evaluating Scope of Coverage, Policy Exclusions and Coverage Extensions and Sub-Limits

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Structuring Covenants in Leveraged Loans and High Yield Bonds for Borrowers and Lenders

Structuring Covenants in Leveraged Loans and High Yield Bonds for Borrowers and Lenders Presenting a live 90-minute webinar with interactive Q&A Structuring Covenants in Leveraged Loans and High Yield Bonds for Borrowers and Lenders Analyzing Financial and Performance Covenants, Equity Cures,

More information

Captive Insurance Companies in Estate Planning: A Profit Maximization and Risk Reduction Tool

Captive Insurance Companies in Estate Planning: A Profit Maximization and Risk Reduction Tool Presenting a live 90-minute webinar with interactive Q&A Captive Insurance Companies in Estate Planning: A Profit Maximization and Risk Reduction Tool Leveraging the Benefits for Asset Protection, Wealth

More information

Negotiating EHR Agreements: Complying with HIPAA, Stark and AKS, Overcoming Privacy and Security Risks

Negotiating EHR Agreements: Complying with HIPAA, Stark and AKS, Overcoming Privacy and Security Risks Presenting a live 90-minute webinar with interactive Q&A Negotiating EHR Agreements: Complying with HIPAA, Stark and AKS, Overcoming Privacy and Security Risks Acquiring an EHR and Meeting Incentive Program

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Commercial Leases: Risk Mitigation Strategies for Landlords and Tenants

Commercial Leases: Risk Mitigation Strategies for Landlords and Tenants Presenting a live 90-minute webinar with interactive Q&A Commercial Leases: Risk Mitigation Strategies for Landlords and Tenants WEDNESDAY, OCTOBER 10, 2012 1pm Eastern 12pm Central 11am Mountain 10am

More information

Allocating Defense Costs Among Multiple Insurers and Between Covered and Uncovered Claims

Allocating Defense Costs Among Multiple Insurers and Between Covered and Uncovered Claims Presenting a live 90-minute webinar with interactive Q&A Allocating Defense Costs Among Multiple Insurers and Between Covered and Uncovered Claims Methods of Allocation Among Insurers and Allocation to

More information

Performance Bonds and CGL Insurance In Construction Projects: Navigating the Interplay Between Insurance and Surety

Performance Bonds and CGL Insurance In Construction Projects: Navigating the Interplay Between Insurance and Surety Presenting a live 90-minute webinar with interactive Q&A Performance Bonds and CGL Insurance In Construction Projects: Navigating the Interplay Between Insurance and Surety Minimizing Risks and Maximizing

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

Negotiating EBITDA and Financial Covenants in Middle Market Loan Agreements

Negotiating EBITDA and Financial Covenants in Middle Market Loan Agreements Presenting a live 90-minute webinar with interactive Q&A Negotiating EBITDA and Financial Covenants in Middle Market Loan Agreements WEDNESDAY, OCTOBER 23, 2013 1pm Eastern 12pm Central 11am Mountain 10am

More information

Data Breach Insurance

Data Breach Insurance Cyber Security Issues in the Healthcare Industry PBI 21st Annual Health Law Institute Pennsylvania Convention Center March 13, 2015 Roberta D. Anderson roberta.anderson@klgates.com @RobertaEsq AGENDA Practical

More information

Builder's Risk and CGL Insurance for Construction Projects: Mitigating Developer and Contractor Risks

Builder's Risk and CGL Insurance for Construction Projects: Mitigating Developer and Contractor Risks Presenting a live 90-minute webinar with interactive Q&A Builder's Risk and CGL Insurance for Construction Projects: Mitigating Developer and Contractor Risks Evaluating Scope of Coverage, Covered Losses,

More information

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features:

Presenting a live 90-minute webinar with interactive Q&A. Today s faculty features: Presenting a live 90-minute webinar with interactive Q&A Drafting and Negotiating Convertible Preferred Stock Provisions: Protecting Interests of Businesses and Investors Structuring Liquidation and Distribution

More information

Negotiating Contractual Indemnity in M&A Deals: Transactional and Litigation Considerations

Negotiating Contractual Indemnity in M&A Deals: Transactional and Litigation Considerations Presenting a live 90-minute webinar with interactive Q&A Negotiating Contractual Indemnity in M&A Deals: Transactional and Litigation Considerations Structuring Terms to Minimize Financial Risks, Measuring

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference

More information

M&A Purchase Price Adjustment Clauses

M&A Purchase Price Adjustment Clauses Presenting a live 90-minute webinar with interactive Q&A M&A Purchase Price Adjustment Clauses Crafting Provisions to Mitigate Buyers' Financial Risks and Achieve Fair Compensation for Sellers THURSDAY,

More information

Commercial Real Estate Loans: Structuring Covenants, Events of Default Provisions and MAC Clauses

Commercial Real Estate Loans: Structuring Covenants, Events of Default Provisions and MAC Clauses Presenting a live 90-minute webinar with interactive Q&A Commercial Real Estate Loans: Structuring Covenants, Events of Default Provisions and MAC Clauses Negotiating Agreement Provisions to Maximize Borrower

More information

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

ESI Discovery in Federal Criminal Cases: Leveraging the New JETWG Recommendations

ESI Discovery in Federal Criminal Cases: Leveraging the New JETWG Recommendations Presenting a live 90-minute webinar with interactive Q&A ESI Discovery in Federal Criminal Cases: Leveraging the New JETWG Recommendations THURSDAY, APRIL 26, 2012 1pm Eastern 12pm Central 11am Mountain

More information

Sales Tax Audits in the Era of Digital Documentation Preparing for a Computer-Based Review Involving Electronic Invoices, Bills of Lading, Etc.

Sales Tax Audits in the Era of Digital Documentation Preparing for a Computer-Based Review Involving Electronic Invoices, Bills of Lading, Etc. Presenting a live 110-minute teleconference with interactive Q&A Sales Tax Audits in the Era of Digital Documentation Preparing for a Computer-Based Review Involving Electronic Invoices, Bills of Lading,

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Ensuring HIPAA Compliance When Transmitting PHI via Patient Portals, Email and Texting

Ensuring HIPAA Compliance When Transmitting PHI via Patient Portals, Email and Texting Presenting a live 90-minute webinar with interactive Q&A Ensuring HIPAA Compliance When Transmitting PHI via Patient Portals, Email and Texting Protecting Patient Privacy, Complying with State and Federal

More information

Solar Leases: Legal Considerations for Property Owners

Solar Leases: Legal Considerations for Property Owners Presenting a live 90-minute webinar with interactive Q&A Solar Leases: Legal Considerations for Property Owners Analyzing Lease Sites and Deal Structures and Addressing Key Document Provisions WEDNESDAY,

More information

Export Controls and Cloud Computing: Legal Risks

Export Controls and Cloud Computing: Legal Risks Presenting a live 90-minute webinar with interactive Q&A Export Controls and Cloud Computing: Legal Risks Complying with ITAR, EAR and Sanctions Laws When Using Cloud Storage and Services TUESDAY, APRIL

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Structuring Rooftop Lease Agreements: Legal and Business Considerations

Structuring Rooftop Lease Agreements: Legal and Business Considerations Presenting a live 90 minute webinar with interactive Q&A Structuring Rooftop Lease Agreements: Legal and Business Considerations Negotiating Leases for Telecom Equipment, Solar Energy, Commercial Farming,

More information

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial

More information

INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013

INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presenters: Roberta D. Anderson John P. Scordo INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presentation to the Association of Corporate Counsel Western Pennsylvania Chapter Copyright

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

Cyber Insurance Presentation

Cyber Insurance Presentation Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach

More information

2012 Winston & Strawn LLP

2012 Winston & Strawn LLP 2012 Winston & Strawn LLP Top 5 Negotiation Points for Software, SaaS, and Outsourcing Agreements Brought to you by Winston & Strawn s Advertising, Marketing, and Entertainment Law Group 2012 Winston &

More information

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

CyberSecurity for Law Firms

CyberSecurity for Law Firms CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a

More information

Negotiating and Navigating the Fraud Exception in Private Company Acquisitions

Negotiating and Navigating the Fraud Exception in Private Company Acquisitions Presenting a live 90-minute webinar with interactive Q&A Negotiating and Navigating the Fraud Exception in Private Company Acquisitions Key Considerations For Drafting a Fraud Exception to an M&A Contractual

More information

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements July 14, 2015 Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Program Overview 1. How to Transfer Risk and

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

Data Privacy, Security, and Risk Management in the Cloud

Data Privacy, Security, and Risk Management in the Cloud Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,

More information

Medical Expert Depositions in Workers' Comp Cases

Medical Expert Depositions in Workers' Comp Cases Presenting a live 90-minute webinar with interactive Q&A Medical Expert Depositions in Workers' Comp Cases Effective Techniques for Deposing Experts and Raising Strategic Objections TUESDAY, MARCH 11,

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Drafting Software Agreement Warranty, Limitation of Liability and Indemnification Provisions

Drafting Software Agreement Warranty, Limitation of Liability and Indemnification Provisions Presenting a live 90-minute webinar with interactive Q&A Drafting Software Agreement Warranty, Limitation of Liability and Indemnification Provisions Negotiating Clauses That Protect Against Service Defects,

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Estate Planning Using LLCs and Limited Partnerships Achieving Estate Tax Savings Through Valuation Discounts, Protecting Against Creditor Claims

Estate Planning Using LLCs and Limited Partnerships Achieving Estate Tax Savings Through Valuation Discounts, Protecting Against Creditor Claims Presenting a live 90-minute webinar with interactive Q&A Estate Planning Using LLCs and Limited Partnerships Achieving Estate Tax Savings Through Valuation Discounts, Protecting Against Creditor Claims

More information

Intellectual Property in M&A

Intellectual Property in M&A Intellectual Property in M&A October 23, 2015 Dallas Bar Association IP Section Steve Stein, Jesse Betts, Craig Carpenter Thompson & Knight LLP Today s Topics Steps in M&A Transactions Drivers in M&A Transactions

More information

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance

More information

Cybersecurity Risk Transfer

Cybersecurity Risk Transfer Cybersecurity Risk Transfer Wednesday, October 30, 2013 Part IV in a 4 part series on Cybersecurity Presented by: Arthur J. Gallagher & Co., Huron Legal and Pillsbury Winthrop Shaw Pittman Pillsbury Winthrop

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Beyond Data Breach: Cyber Trends and Exposures

Beyond Data Breach: Cyber Trends and Exposures Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in

More information

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace Testimony of Ben Beeson Vice President, Cyber Security and Privacy Lockton

More information

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Negotiating Software as a Service Contracts

Negotiating Software as a Service Contracts Presenting a live 90-minute webinar with interactive Q&A Negotiating Software as a Service Contracts Guidance for Corporate and Technology Counsel for Structuring Effective SaaS Agreements TUESDAY, SEPTEMBER

More information

Insurance in the M&A Industry

Insurance in the M&A Industry For Audio Participation Dial: 1.866.283.8243 Passcode: *1349975* Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data

More information

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Policy Considerations for Covering Special Exposures Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Special exposures Coverage that targets a loss with

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

Marital Deduction Revocable Trusts: Funding Formulas to Minimize Tax and Maximize Spousal Benefits

Marital Deduction Revocable Trusts: Funding Formulas to Minimize Tax and Maximize Spousal Benefits Presenting a live 90-minute webinar with interactive Q&A : Funding Formulas to Minimize Tax and Maximize Spousal Benefits Selecting, Structuring, and Applying Pecuniary Marital, Non-Marital and Fractional

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

Managing Sales Tax Data: Streamlining Internal Controls to Maximize Compliance Efficiency

Managing Sales Tax Data: Streamlining Internal Controls to Maximize Compliance Efficiency Presenting a live 110-minute teleconference with interactive Q&A Managing Sales Tax Data: Streamlining Internal Controls to Maximize Compliance Efficiency THURSDAY, FEBRUARY 20, 2014 1pm Eastern 12pm Central

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

Negotiating Representations, Warranties and Indemnification Clauses in Technology Agreements

Negotiating Representations, Warranties and Indemnification Clauses in Technology Agreements Presenting a live 90-minute webinar with interactive Q&A Negotiating Representations, Warranties and Indemnification Clauses in Technology Agreements Best Practices for Minimizing Risk, Allocating Liability,

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015

M&A in 2015: Successor Liability Under the FCPA. Norton Rose Fulbright US LLP Thursday, February 26, 2015 M&A in 2015: Successor Liability Under the FCPA Norton Rose Fulbright US LLP Thursday, February 26, 2015 Speaker Marsha Z. Gerber Partner Norton Rose Fulbright US LLP Marsha Gerber is a partner in the

More information

Settling Wage/Hour Claims: Weighing Settlement Options, Negotiating Damages, and Ensuring Court Approval

Settling Wage/Hour Claims: Weighing Settlement Options, Negotiating Damages, and Ensuring Court Approval Presenting a live 90-minute webinar with interactive Q&A Settling Wage/Hour Claims: Weighing Settlement Options, Negotiating Damages, and Ensuring Court Approval WEDNESDAY, JANUARY 15, 2014 1pm Eastern

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

Cyber and CGL Insurance Coverage for Data Breach Claims

Cyber and CGL Insurance Coverage for Data Breach Claims Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance

More information