What Does Cyber Insurance Expect of Me?
Cyber insurance almost seems like this black hole that is mysterious to understand. Yet if we’re victims of a cyber incident – something like ransomware, social engineering, business email compromise, etc – we’re going to want that insurance to pay off. So what can we do to enhance the likelihood that cyber insurance will pay when needed? What does my cyber insurance policy expect of me? That’s what we’re going to explore in this fast paced session.
You Might Also Be Interested In...
What Does Cyber Insurance Expect of Me?
Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Here are some of the cyber liability insurance trends you need to know about.
10 Tips to Help Small Businesses Get Ready for the Unexpected
What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan in case of a tornado, hurricane, or earthquake? The unexpected can happen anytime, and small businesses can get hit particularly hard.
Examples of How a Data Breach Can Cost Your Business For Years
In the digital age, data is the lifeblood of businesses. It fuels operations, decision-making, and customer interactions. But there is a dark underbelly of this data-centric landscape. It’s the persistent threat of data breaches.
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
Preparing for Insider Threats