D&O Insurance Myths (Part 1)
What to Do if Your Suppliers Are in Distress - Is It Time to Find a New Supplier?
What to Do if Your Suppliers Are in Distress - Candid Conversations with Suppliers in Distress
What to Do if Your Suppliers Are in Distress - Identifying Suppliers in Distress
The Calm Before the Storm: Planning for Catastrophic Weather Events
Out With a Bang: Current State of Play on Coverage for COVID-Related Losses
Regulating the Internet of Things
The Intersection of Insurance and Bankruptcy – Part 2
On-Demand Webinar | Impacts of COVID-19 on Litigation Economic Damages
On-Demand Webinar | Insurance Issues Faced by Employers in Times of COVID-19
COVID-19 in the Workplace - PPP Update, COVID Plans from the Biden Transition Team, Higher Education Relief Package Provision, COVID WARN Act Developments
How an Am Law 200 Firm is Working Towards Solutions to 2020’s Challenges with Jeremy Sacks: On Record PR
Second-Wave Contingency Planning and Risk Mitigation Strategies - Diagnosing Health Care Podcast
COVID-19 Business Interruption Insurance Claims: A Practical Perspective
WEBINAR: COVID-19 Insurance Coverage Class Actions
Compliance Perspectives: Compliance During a Business Interruption
Butler's Thursday Tips #3 | Handling Business Loss Claims
AF COVID-19 Podcast: Business Interruption Coverage, Do You Have a Claim?
Lifting the Fog Over Lobbying Compliance - updated with impact of COVID-19 on NYS lobbying community
Litigation and COVID-19: How to Protect Your Business in This Time of Crisis
Cyber risk has grown demonstrably in frequency and severity in the past 10 years—and, in tandem, the cyber insurance policy has grown in breadth and complexity. This past year, a record number of organizations fell victim to...more
In this second of a two-part conversation, Ryan discusses current trends and challenges, regulatory changes and shifts, and insurance-related best practices for private equity sponsors. In part one, Ryan talked about...more
Lynda A. Bennett, Heather Weaver, and Josh Weisberg of SterlingRisk continue their year-end conversation about what changed in the insurance recovery space in 2024 and what to expect in 2025. Lynda, Heather, and Josh...more
Cyberattacks and technology disruptions in healthcare don’t just cost organizations financially — they can threaten patient safety and put organizational reputations at risk. How ready is your organization for a potential...more
As we prepare to close the books on another eventful year in the cyber and privacy space, Wiley’s cyber insurance team is already making predictions for 2025. Q: So, let’s get right into it – based on your experience this...more
In this era of big data, smart devices, and constant connectivity, the clock's already ticking on your next data breach – it's just a matter of time. For companies of all sizes and across every industry, the stakes have never...more
Over the past 20 years, technology has changed the way we communicate, conduct business, and live. It is rare to walk down a city street and not see a person using some type of technology. It has become an integral and...more
In Part I of this series, we posed a series of questions to consider when purchasing cyber insurance. Our approach was deliberate: the right questions help get you the right insurance to address cyber risks facing your...more
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
As 2024 rapidly approaches, we look back at some of the key decisions, trends, and developments impacting the U.S. insurance industry in 2023 and look ahead at some trends and cases to watch in 2024. Insurers continue to...more
The modern security ecosystem is diverse and ever-changing, a place where cyber risk is top of mind for leaders at all levels, and threats to information / data security and privacy evolve at the speed of the technical...more
Losses arising from email scams are usually covered, if at all, under a company’s crime policy. But a recent decision from The District Court in Minnesota suggests that recourse may also be found under an insured’s cyber or...more
Some policyholders mistakenly assume that all cyber insurance policies provide coverage for much the same type of losses. But unlike many other types of commercial insurance, cyber has not become standardized in the years...more
As previously reported, on November 3, 2022, the federal district court for Minnesota, applying Minnesota substantive law, ruled that an insured was entitled to coverage under a Cyber Business Interruption clause for money...more
The concept of “security by obscurity” is officially outdated. In recent years, cyber-attacks have become increasingly sophisticated, destructive, and indiscriminate. In today’s landscape, cyber threats can come from internal...more
While cyber was incorporated in some general liability policies (GL) of the 1980s, the first cyber standalone policy was written in 1997 through AIG. Though groundbreaking, as it was the first to address cybersecurity, it was...more
Market stabilization is the theme as we closed the first quarter of 2022. We monitored the first quarter earnings releases of commercial insurers carefully to detect trends. All the top commercial lines insurers reported rate...more
Energy companies in the power and oil and gas sectors are leading targets of cyberattacks, as threats to critical infrastructure systems continue to rise. A 2021 report by a third-party cyberrisk company found that a quarter...more
Over the past several years, if your organization experienced a cyberattack, such as ransomware or a diversion of funds due to a business email compromise (BEC), and you had cyber insurance, you likely were very thankful....more
Continued widespread cyber attacks have leaders in just about every industry wary and watchful, and insurance underwriters are no exception. Given the increase in claims from recent ransomware attacks, cyber insurers are...more
Ransomware attacks are on the rise. Cyber criminals continue to exploit lax security measures, which have become more acute in the work-from-home environment, and hack into companies’ systems, encrypt their data, and then...more
Thousands of devices connecting to the internet make up the Internet of Things (IoT). While helping to streamline operations and improve productivity, the advantages of IoT are not without risks. Recent federal and state laws...more
During times of economic turbulence and commercial uncertainty, your business team and corporate counsel are well advised to undertake a more deliberate and thorough due diligence process when entering into contract and...more
The rapidly increasing importance of a company’s environmental, social and governance (ESG) performance to its business value, has been a critical trend leading into 2020. This trend was accelerated by the COVID-19 pandemic,...more
In this month's edition of our Privacy & Cybersecurity Update, we examine the Seventh Circuit's ruling finding standing for an Illinois Biometric Information Privacy Act claim, the European Data Protection Board's updated...more