Cyber University On-Demand

Recorded On: 09/17/2024

Did you miss the live session of Cyber University? In this on-demand version, you'll have access to the Learner Workbook, PowerPoints, and session recordings from the most recent live virtual session. By completing this course, you'll meet the Cyber University requirement for the CPLP designation. This course does not qualify for state insurance license CE/CLE credit.

Key:

Complete
Failed
Available
Locked
Privacy and Cybersecurity Factual and Legal Foundations - Part 1
Open to view video.  |  75 minutes
Open to view video.  |  75 minutes Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. Part 1 of this session explores privacy and cybersecurity concepts.
Privacy and Cybersecurity Factual and Legal Foundations - Part 2
Open to view video.  |  58 minutes
Open to view video.  |  58 minutes Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. Part 2 of this session explores applicable privacy and cybersecurity laws and regulations.
Non-Cyber Line of Coverage, Evolution of Cyber Coverage, and Interplay Among Lines
Open to view video.  |  73 minutes
Open to view video.  |  73 minutes Learn about coverage for privacy and cyber risks under various traditional policies and the evolution of so-called “cyber” coverages, highlighting the types of provisions offered for first- and third-party coverage. Then consider how a single loss may implicate different lines of coverage.
Debunking Myths about Cyber Insurance
Open to view video.  |  63 minutes
Open to view video.  |  63 minutes This session discusses many of the misperceptions about cyber insurance that contribute to what are still relatively low adoption rates in certain industries. The speakers explore some of these myths as well as counter-arguments to utilize when making the business case for entities adding cyber insurance to their risk management portfolios.
Underwriting, Breach Response, 1st Party Incidents, 3rd Party Claims, & Emerging Coverages
Open to view video.  |  72 minutes
Open to view video.  |  72 minutes This session provides a broad overview of the state of the market, basic and evolving coverages, and claims. Learn the background basics of these points as well as emerging issues and products in this evolving marketplace.
Risk Management and How Business Leaders Prepare and Respond
Open to view video.  |  66 minutes
Open to view video.  |  66 minutes Cyber, privacy and security risks are not just a task for the IT department to tackle. These are enterprise risks and require a task force within an organization. In this session, a risk manager and a chief information security officer discuss how they manage these risks, communicate and plan.
Breach Scenario: Surviving a Cybersecurity Incident
Open to view video.  |  71 minutes
Open to view video.  |  71 minutes This session walks through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of follow up is necessary.
Cyber Roundtable: Trends, Risks, and Emerging Issues
Open to view video.  |  76 minutes
Open to view video.  |  76 minutes Our roundtable experts discuss common cyber risks and emerging exposures that should be on any cyber insurance professional’s radar. This session also explores the role of the policy holder and insurers as it relates to mitigating cyber risks and the current state of the cyber insurance market.
Completion Certificate
No credits available  |  Certificate available
No credits available  |  Certificate available When printing your completion certificate, please make sure to click on "More Settings," then check the box for "Background graphics" to ensure the best quality.