Ep 121: Strategies for Reducing the Cost of Your Cyber Liability Insurance Policy
Description
Like many other businesses, law firms are at significant risk of cyber-attack and increasingly are turning to cyber liability insurance (CLI) to transfer some of their cyber risk. But many are being denied coverage or face high premiums due to shortfalls in their cybersecurity controls.
In this episode, your host John Verry, CBIZ Pivot Point Security Managing Director, sits down with Jack Liljeberg, Assistant Broker at Thompson Flanagan. Jack helps give business and security leaders in the legal vertical, as well as anyone seeking CLI coverage, a comprehensive update on the state of the CLI marketplace and critical issues to be aware of.
In this episode, join us as we discuss:
· Whether CLI premiums still increasingly rapidly or have stabilized
· Most critical information security controls that businesses need to obtain CLI coverage or avoid onerous premiums
· The importance of honesty, accuracy, and plenty of detail in CLI applications
· Exemptions and other issues to watch out for in CLI policies
· Other insurance coverage types that can bridge gaps in a firm’s CLI coverage
To hear this episode and many more like it, we encourage you to subscribe to the Virtual CISO Podcast.
Just search for The Virtual CISO Podcast in your favorite podcast player or watch the Podcast on YouTube here.
To stay updated with the newest podcast releases, follow us on LinkedIn here.
In this episode of The Virtual CISO Podcast, your host John Verry is joined by Mike Craig to break down the differences between FedRAMP, TxRAMP, AZRAMP, and StateRAMP.
Together, they discuss:How the Naoris Protocol establishes decentralized trust for compute endpoints.
Key distinctions between...
Published 10/17/24
In this episode of The Virtual CISO Podcast, your host, John Verry, sits down with David Carvalho, a cryptography and cybersecurity expert with over 25 years of experience, to explore the next frontier in cybersecurity: decentralized security models and post-quantum cryptography.
How the Naoris...
Published 09/23/24