Cyber insurance as a part of a cyber resilience program

Presented by

Steven Ross, Executive Principal | Risk Masters International

About this talk

Historically, risk management has consisted of the controls over risk, acceptance of risk, and transfer of risk. Cyber resilience overlays those concepts with cyber-related security, business continuity and cyber insurance. This presentation from Risk Masters International's Executive Principal Steven Ross will examine how insurance fits into a cyber resilience program and what the challenges are in obtaining coverage that meets an organization’s needs. Tune into this webinar to learn: • How market forces, especially ransomware and cryptocurrency, have affected both resilience and insurance. • The technology challenges in acquiring cyber insurance. • How small and medium sized businesses are affected in their ability to be cyber resilient. • Inclusion of artificial intelligence in insurance decisions. About the speaker: Steve holds certification as a Master Business Continuity Professional (MBCP) as well as a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA). He is a specialist in business continuity management, IT disaster recovery planning, and information security and has implemented programs for numerous banks, government agencies, and industrial corporations. Before founding Risk Masters, Steve was with Deloitte & Touche as the leader of their Business Continuity Management practice. In recent years, his focus has been on the resilience of large business and technology environments. He is editor of the multi-volume series, e-Commerce Security, and author of several of the books in the series.
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (719)
Subscribers (199930)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.