D&O Insurance Myths (Part 1)
What to Do if Your Suppliers Are in Distress - Is It Time to Find a New Supplier?
What to Do if Your Suppliers Are in Distress - Candid Conversations with Suppliers in Distress
What to Do if Your Suppliers Are in Distress - Identifying Suppliers in Distress
The Calm Before the Storm: Planning for Catastrophic Weather Events
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Regulating the Internet of Things
The Intersection of Insurance and Bankruptcy – Part 2
On-Demand Webinar | Impacts of COVID-19 on Litigation Economic Damages
On-Demand Webinar | Insurance Issues Faced by Employers in Times of COVID-19
COVID-19 in the Workplace - PPP Update, COVID Plans from the Biden Transition Team, Higher Education Relief Package Provision, COVID WARN Act Developments
How an Am Law 200 Firm is Working Towards Solutions to 2020’s Challenges with Jeremy Sacks: On Record PR
Second-Wave Contingency Planning and Risk Mitigation Strategies - Diagnosing Health Care Podcast
COVID-19 Business Interruption Insurance Claims: A Practical Perspective
WEBINAR: COVID-19 Insurance Coverage Class Actions
Compliance Perspectives: Compliance During a Business Interruption
Butler's Thursday Tips #3 | Handling Business Loss Claims
AF COVID-19 Podcast: Business Interruption Coverage, Do You Have a Claim?
Lifting the Fog Over Lobbying Compliance - updated with impact of COVID-19 on NYS lobbying community
Litigation and COVID-19: How to Protect Your Business in This Time of Crisis
In today’s fast-paced and increasingly unpredictable global environment, large enterprises face mounting risks—natural catastrophes, climate-related disruptions, supply chain breakdowns and emerging digital threats....more
Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more
Lynda A. Bennett, Heather Weaver, and Josh Weisberg of SterlingRisk continue their year-end conversation about what changed in the insurance recovery space in 2024 and what to expect in 2025. Lynda, Heather, and Josh...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more
In Part I of this series, we posed a series of questions to consider when purchasing cyber insurance. Our approach was deliberate: the right questions help get you the right insurance to address cyber risks facing your...more
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
The decision to integrate Generative AI (“GAI”) into an organization is one that occupies significant space these days in many corporate board rooms. In today’s rapidly evolving business landscape, the adoption of GAI...more
Some policyholders mistakenly assume that all cyber insurance policies provide coverage for much the same type of losses. But unlike many other types of commercial insurance, cyber has not become standardized in the years...more
A Minnesota federal district court has held that a software company is entitled to coverage for losses related to diverted billing emails under its business interruption coverage, rejecting the insurer’s argument that the...more
Kidnapping, treasure hunts, insurgents shooting down airplanes — sounds like the Fall TV lineup. But no, it’s our October Insurance Update. And in honor of the month’s most treasured sporting event, the Fall Classic, we...more
While cyber was incorporated in some general liability policies (GL) of the 1980s, the first cyber standalone policy was written in 1997 through AIG. Though groundbreaking, as it was the first to address cybersecurity, it was...more
Energy companies in the power and oil and gas sectors are leading targets of cyberattacks, as threats to critical infrastructure systems continue to rise. A 2021 report by a third-party cyberrisk company found that a quarter...more
Over the past several years, if your organization experienced a cyberattack, such as ransomware or a diversion of funds due to a business email compromise (BEC), and you had cyber insurance, you likely were very thankful....more
Continued widespread cyber attacks have leaders in just about every industry wary and watchful, and insurance underwriters are no exception. Given the increase in claims from recent ransomware attacks, cyber insurers are...more
Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more
Each month, Nossaman's complimentary Employment BUZZ webinar series covers a different topic of interest to employers, including tax, insurance, intellectual property and employment issues. These "quick hit" 30-minute...more
The Biden administration has hit the ground running with executive orders, regulatory and legislative priorities, and cabinet-level and other top posts being announced on a daily basis. Our public policy colleagues have been...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the Seventh Circuit's ruling finding standing for an Illinois Biometric Information Privacy Act claim, the European Data Protection Board's updated...more
While most of society struggles to flatten the curve, treat the sick and restart the economy, regrettably, some bad actors have used the COVID-19 emergency as an opportunity to exploit vulnerabilities for personal gain. One...more
Attorneys are well aware of the ways in which corporate clients are increasingly conducting their business and affairs electronically. A business may routinely place orders with trusted vendors via e-mail, rely on the...more
We want to enable our personnel to work from home during this health crisis. What do we need to worry about from a privacy and cybersecurity perspective? 1.Equipment. Personnel working remotely will need equipment, and you...more
As concerns about the coronavirus (COVID-19) continue to grow, many companies are planning to have more employees work from home. While these measures are aimed at keeping employees healthy and safe, it’s also important to...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more