DATE: Monday, October 28 |
TIME: 3:00-3:30 pm |
LOCATION: Hope Ballroom D |
DURATION: |
Join us for an insightful fireside chat on the pros and cons of cyber insurance, hosted by Carrie Yang, Senior Vice President at Marsh Cyber Practice, and moderated by Ben Wilkens, Cybersecurity Principal Engineer at NMFTA.
This session will explore the intricacies of cyber insurance, addressing its impact on businesses of all sizes, from large carriers to small operators. We will discuss the critical questions you need to ask when considering cyber insurance, and how it influences your business plan, customer contracts, Service Level Agreements (SLAs), and various other aspects of your operations.
For trucking executives, fleet owners, VPs of Technology, VPs of Information Security, IT professionals, and cybersecurity researchers, understanding the role of cyber insurance is crucial. As cyber threats become more sophisticated, having the right insurance can be a vital component of your risk management strategy.
Who Should Attend:
This session is designed for all stakeholders in the trucking industry who are involved in decision-making processes related to cybersecurity and risk management, including executives, fleet owners, IT professionals, and cybersecurity researchers.
Don’t miss this opportunity to gain a deeper understanding of cyber insurance and its significance in the trucking industry.
Speakers
Carrie Yang
Senior Vice President, Marsh Cyber Practice
Carrie Yang is the Senior Vice President within Marsh Cyber Practice based in Chicago. As a senior advisor, Carrie is responsible for structuring, marketing, and negotiating tailored cyber/professional liability programs for stateside risk management client needs.
Ben Wilkens
Cybersecurity Principal Engineer, NMFTA
With nearly a decade of experience in cybersecurity and enterprise IT leadership, Ben has honed his ability to lead cross-functional teams in creatively solving complex business challenges. At NMFTA, he spearheads research initiatives and guides teams in the development of cutting-edge cybersecurity technologies, methodologies, and strategies designed to protect critical information systems and networks.