Companies Home Search Profile

Cyber Insurance for IT Professionals

Focused View

Kip Boyle

1:04:08

146 View
  • 01 - Why IT pros need to know cyber insurance.mp4
    00:44
  • 01 - Understanding the impact of cyber risk.mp4
    05:31
  • 02 - Insurance and your cyber risk management program.mp4
    04:05
  • 03 - Insurance lawsuits over cyber coverage.mp4
    03:50
  • 01 - Reason 1 Cyber is a dynamic risk.mp4
    03:20
  • 02 - Reason 2 More restrictions on your computers.mp4
    04:15
  • 03 - Reason 3 Cyber insurance is immature.mp4
    04:35
  • 04 - Reason 4 More buyers than sellers right now.mp4
    02:26
  • 01 - Qualifying is getting tougher every year.mp4
    03:21
  • 02 - Core IT controls required for everyone.mp4
    04:50
  • 03 - Additional IT controls for big organizations.mp4
    03:13
  • 04 - Completing the insurance application.mp4
    04:41
  • 05 - Live review of completed insurance application.mp4
    05:21
  • 06 - Responding to external vulnerability scan reports.mp4
    03:49
  • 01 - Insurance industry as a cybersecurity leader.mp4
    03:07
  • 02 - How can we self-insure for cyber.mp4
    02:10
  • 03 - Future of cyber insurance.mp4
    04:16
  • 01 - Next steps.mp4
    00:34
  • Description


    If you’re an IT professional, you may be wondering why cyber insurance has emerged as such an important topic in your field. Due to the increasing number of recent, extremely costly attacks, cyber insurance is now an essential component of an effective risk management strategy. But how do you develop a strategy that works for you when cyber insurance has become so difficult and expensive to get.

    In this course, instructor Kip Boyle provides an overview of the benefits and challenges involved in obtaining cyber insurance, offering tools and tips along the way to help you navigate the hurdles of the cyber insurance application process. Learn more about why cyber insurance can be so difficult to procure, and why qualifying for a good rate and policy depends on your organization’s IT controls. Kip shares insights in a live demonstration that shows you how to complete your own application, with advice and tricks you can use to boost your odds of being approved.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I’ve been working in cybersecurity since 1992. I started as an air force officer, leading information technology teams. My assignments had us handling very sensitive information related to air-to-air weapons testing, so we were expected to practice what I now call “good cyber hygiene”. My most challenging job during this time was director of wide area network security for the F-22 “Raptor”. At the time, we were getting ready for the first production jets to come down the assembly line. It was very exciting! After the USAF, as a project leader at Stanford Research (SRI), I helped many Fortune 100 firms grapple with cybersecurity on a large scale. The problems they were dealing with were often 5 years or more ahead of the mainstream. So, there were no “off-the-shelf” solutions and many of our customers didn’t even know where to start. With no one else to turn to, they would come to us. Fast forward a few years and I was selected to be Chief Information Security Officer (CISO) of an insurance company. They owned a few subsidiaries, so I was also providing cybersecurity leadership to senior decision-makers of a community bank, credit union, debit/credit card transaction processor, and an IT managed service provider. I learned a lot about the business value of cybersecurity during those years. Then, in June of 2015, I launched my own company, Cyber Risk Opportunities. These days, cyberattacks are hurting businesses, even bankrupting them. That's wrong! We help executives manage cyber as the business risk it has become. So they’ll be ready no matter what happens. Setting priorities is a big goal in our work. Today, we have a lot of customers. Right now, we’re helping both a professional basketball team and a biotech company optimize their cyber risk management programs. It’s great to be able to use the same approach to help organizations that are so different in just about every obvious way. But, just under the surface, they are both very similar in terms of the cyber risk practices they need to follow. My mission is to enable executives to become more proficient cyber risk managers. Our customers include the U.S. Federal Reserve Bank, Boeing, Visa, Intuit, Mitsubishi, DuPont, and many others. And, because so many organizations in the US need better cyber risk management at the executive level, we’ve launched a partnership program so other professionals in positions of trust, such as lawyers and technology service providers, can use our tools and methods to help their existing customers thrive as cyber risk managers. Ask me about it!
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 18
    • duration 1:04:08
    • English subtitles has
    • Release Date 2023/08/01

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness