5 Things to Know Before Your Next Cybersecurity Insurance Renewal

Date: March 3, 2022

Webinar Date: Thursday, March 10

Time: 2:00 PM – 3:00 PM CT

Cyber-attacks and malware have become very sophisticated, and the tools and protections to mitigate the risks have necessarily become complex. As the cybersecurity landscape continues to evolve, so do the coverages and requirements of the insurance carriers. Making sense of the various coverages that are available, the protections and risk mitigation strategies you must have in place, and the actions that your organization should take (before and after a security event) is critical in protecting you from adverse outcomes from a cybersecurity incident. Join Jim Tufts of ICE Technologies and Brant Couch of Rural Hospital Insurance of America (RHIA) in this webinar to learn the different forms of cyber insurance coverages and what protections each represents, the requirements that carriers have begun demanding to underwrite coverage and some of the best practice security strategies that help protect you from cyber threats and will help in holding the line or reducing coverage premiums. Jim Tufts has over 35 years of IT experience and has intimate knowledge of the costs of cyber-attack incidents and prominent cyber risks seen in rural facilities. Brant is the CEO of HealthSure, managing RHIA for NRHA and TORCH. Brant will review the benefits of coverage add-ons, exclusions, and requirements.

Learning Objectives:

  • Participants will gain an understanding of the four prominent cyber risks, and the distinct insuring agreements that provide coverage for those risks.
  • Participants will gain an understanding of the coverage add-on that may be available from carriers that could be beneficial to their organization.
  • Participants will understand what exclusions are typically found in cyber insurance policies.
  • Participants will gain an understanding of the protections and solutions that insurance carriers are starting to demand before underwriting policies.
  • Participants will gain insight into some of the best practices for cybersecurity strategies that will better position their organization to mitigate risks 

Register