A resource by Eversheds Sutherland - Cyber extortion and cyber insurance
Learn how cyber-insurance can help protect businesses.
Learn how cyber-insurance can help protect businesses.
This ACC Guide, sponsored by Blank Rome LLP, provides in-house counsel with an overview of commercial insurance issues that may arise in the United States.
This guide provides corporate counsel and international practitioners with comprehensive jurisdiction-by-jurisdiction guidance to insurance and reinsurance laws and regulations around the world.
“Double extortion” attacks—which combine a traditional ransomware attack encrypting data with a threat to disclose the encrypted data publicly—are now increasingly common. Insurers in the U.S., UK and EU insurance markets are responding to the unprecedented increase in global ransomware attacks by scaling back coverage. This resource describes market developments and provides guidance to policyholders on managing the ransomware risk.
It’s hard to envision a medical evaluation without a stethoscope. Invented in 1816, it revolutionized the information-gathering capabilities of doctors. Nowadays, many medical devices contain configurable embedded computer systems. Where there are computers, there are vulnerabilities. Learn more about the cybersecurity risks of medical devices.
Corporate crises, by their very nature, can severely disrupt a company and jeopardize its future.
While appearances may suggest that enterprise risk management (ERM) and governance risk and compliance (GRC) aim to solve for the same problems, they are arguably separate processes with different approaches and objectives. This session will review the differences between ERM and GRC approaches and assessments, and reveal how to identify which may be best suited to align with your company’s compliance program.
A list of ACC legal resources related to each session presented at the Risk Management Track of the Mini MBA Business Education course held at Boston University.
Review various types of business insurance including D&O, E&O and special lines of coverage. Learn to understand standard policy clauses, insurers' interpretation of those clauses and practical steps you can take to maximize your company's insurance recoveries.
We have all heard about big data breaches: millions of customer records at risk, credit monitoring for an extended period of time, etc. What about the smaller run-of-the-mill security or privacy breaches? Can we prevent them? Do we have to report them? How do you set up incident response reporting? How do you do a security risk assessment to mitigate your risks?
This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.
By using the site, you consent to the placement of these cookies. For more information, read our cookies policy and our privacy policy.