Cyber Resiliency in a defining moment in history


Recovery – Cyber Insurance: Making sure you are covered & bouncing back
Judy Selby, Partner, Hinshaw & Culbertson
11th August 2020 at 12:00 (EDT)

In this session, Judy will provide an overview of cyber insurance, the benefits of getting the right policy, and the types of risks that are typically covered. She will discuss how to obtain the right coverage to fit a business’s cyber and privacy risk profile, how to apply for cyber coverage, and some practical steps companies should take to avoid jeopardizing their coverage in the event of a cyber or privacy incident.

Join us on the 11th August 2020 at 12:00 EDT for the fifth and final episode in a five-part highly interactive CxO webinar series. Aimed at CxO’s, these sessions will be 30-45 minutes in length and are designed to provide you with actionable insight based on the speaker’s deep industry knowledge.

We are now operating in a new world and one unrecognizable from 2019. Society, commerce and our lives have been disrupted on a level not experienced by many generations.  In the current circumstances, resilience has become a number one business priority for organizations.

Despite the unexpected, complex and far-reaching circumstances faced by risk management and security functions worldwide, the verdict is clear – planning pays off. Those who had invested in resilience planning and testing have reaped the benefits, by following established processes and procedures to respond quickly.

Click here to register

 

Sponsors

Recorded Future delivers security intelligence to amplify the effectiveness of security and IT teams by informing decisions in real-time with contextual, actionable intelligence. By analyzing data from open, dark, and proprietary sources, Recorded Future offers a singular, integration-ready view of threat information, risks to digital brand, vulnerabilities, third-party risk, geopolitical risk, and more.
https://www.recordedfuture.com

 

 

BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.
www.beyondtrust.com