The Road to Regulation: Vehicle Service Contracts Explained — Moving the Metal: The Auto Finance Podcast
AI Today in 5: August 11, 2025, The ACHILLES Project Episode
AI Today in 5: August 8, 2025, The Don’t Wait Episode
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 244: The Future of Independent Physician Practices with Ray Waldrup of The Leaders Rheum
Innovation in Compliance: Integrating AI in Compliance and Risk Management with Jana Brost
The Standard Formula Podcast | Assessing Prudential Solvency Regimes in the Middle East
Innovation in Compliance: Exploring the Intersection of Compliance, Technology, and AI with Ben Sperry
Innovation in Compliance: Strategic Compliance in Regulated Industries with Kerri Reuter
The Standard Formula Podcast | Assessing Prudential Insurance Regulation in Japan
The Standard Formula Podcast | Unpacking the IAIS’ Adoption of the Insurance Capital Standard
AI Talk With Juliana Neelbauer - Episode Three - Cybersecurity Insurance: Coverage Challenges and Changes
AGG Talks: Healthcare Insights Podcast - Episode 7: National MultiPlan Litigation: A Guide for Healthcare Providers
Loading and Unloading Under GL and Auto Policies: 2024
The Duty to Cooperate Under a Liability Policy
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
The Standard Formula Podcast | The SFCR and Other Public Reporting: A Solvency II Cornerstone
The Standard Formula Podcast | Insurers in Difficulty: Staying Compliant Under Solvency II
Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
On Aug. 14, 2025, the New York Department of Financial Services (NYDFS) issued a Consent Decree announcing that Healthplex, Inc. (Healthplex) has agreed to pay a $2 million fine, as a result of an investigation into a 2021...more
Part III: Leveraging Insurance to Mitigate AI Risks - As boards navigate the complex landscape of AI integration, the risks associated with this powerful technology are multifaceted and evolving. From potential data breaches...more
A recent appellate court decision could help policyholders secure insurance coverage for losses arising out of state-sponsored cyberattacks. In Merck & Co., Inc. v. ACE American Ins. Co., the Superior Court of New Jersey...more
When a cybersecurity-related incident occurs, an insured should not automatically assume a standard commercial general liability (CGL) policy issued by an insurer will cover their losses, as CGL policies generally afford...more
In a decision with significant implications for policyholders seeking coverage for social engineering scams and cybercrime losses, the US Court of Appeals for the Ninth Circuit held in Ernst and Haas Management Company, Inc....more
With more frequent and more severe ransomware attacks against health care platforms and vendors and the increasing use of telemedicine, it is critical to understand how to proactively defend your organization using robust...more
The Indiana Supreme Court, applying Indiana law, has held that an insured may be entitled to coverage for a ransom payment under a commercial crime policy if the circumstances of the attack “fraudulently caused” the insured...more
Amid the demands of the COVID-19 pandemic, telemedicine became a vital resource for physicians and patients alike. Even with a potential “new normal” on the horizon, telemedicine is here to stay. But with the expansion of...more
Almost four months have passed since the World Health Organization declared COVID-19 a global pandemic on March 11, 2020. Continued social distancing and other precautionary measures have driven many organizations to expand...more
Companies of all sizes have fallen victim to attacks whereby fraudsters will use deceptive communications, such as spoofed emails, to trick an employee into transferring money into the fraudsters’ control. While these...more
In this high tech era we live in, creating, storing and using data is commonplace. The sheer quantity and scope of data has made protecting that data of paramount importance. Yet, every day we hear about another data...more
The “WannaCry” and “NotPetya” computer viruses that infected computer systems around the world in 2017 sounded a wakeup call. They demonstrated the power of a cyber event to disrupt the core operations of numerous companies...more
In June 2017, the NotPetya virus crippled many large companies including Merck and Mondelez (the manufacturer of Nabisco, Cadbury, and Toblerone). The aggregated losses, including property damage, operational disruptions, and...more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
Fraudsters deploy different computer-related techniques but toward the same end – “gaming the system” for their own financial gain. Some victims turn to insurance for recovery. Four recent federal appellate decisions reveal...more
When you’re buying a new car, you rely on a good salesperson to impress you with all of its features and gadgets. But when it’s time for maintenance, or when something goes wrong, you don’t go back to that salesperson to look...more
Remember the “good” ol’ days when the run-of-the-mill theft involved someone physically taking something tangible? That is so 20th century. Now, thieves and fraudsters are able to use computers and the internet to carry out...more
As cyber hacking and phishing schemes become more common, one issue that is often raised is whether, and to what extent, damages resulting from these incidents fall within the coverage afforded under a standard commercial...more
The FBI continues to warn that losses are on the rise from business email compromise (BEC) or “social engineering” schemes, which the Bureau describes as: Carried out by transnational criminal organizations that employ...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more
In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more
In this edition of our Privacy & Cybersecurity Update, we look at a series of recent court rulings regarding standing in privacy cases, most of which suggest plaintiffs will continue to have a difficult time establishing...more
The coverage landscape for “Business E-mail Compromise” (BEC) scams remains somewhat tenuous, as organizations and carriers continue to battle in court over the extent of coverage. Although recent positive,...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more
As cyber attacks increase at an unprecedented pace, more and more businesses are purchasing cyber insurance to protect against that risk. The insurance industry now faces an avalanche of claims, and those claims now are...more