67 episodes

Is a podcast that focuses on how companies can quantify and qualify the cost of a data breach. Chattinn Cyber features some of the most well respected privacy and cyber experts in the world.



Join the conversation with Business Leaders, Government Agencies, and Cyber Risk Experts to learn more about how and why they got into Cyber Risk and to explore the rapidly changing threat of this landscape that affects us all domestically as well as abroad.

Chattinn Cyber Marc Schein

    • Business
    • 4.8 • 10 Ratings

Is a podcast that focuses on how companies can quantify and qualify the cost of a data breach. Chattinn Cyber features some of the most well respected privacy and cyber experts in the world.



Join the conversation with Business Leaders, Government Agencies, and Cyber Risk Experts to learn more about how and why they got into Cyber Risk and to explore the rapidly changing threat of this landscape that affects us all domestically as well as abroad.

    “Best Practices: How to Protect Your Business Against Bad Actors & Cyber Threat”

    “Best Practices: How to Protect Your Business Against Bad Actors & Cyber Threat”

    Tech-related business insurance is evolving fast and Anthony Dolce, our guest on this episode of Chattinn Cyber, is a thought leader at the forefront. As head of Professional Liability & Cyber Underwriting at The Hartford, he brings 25 years of industry expertise to the myriad issues shaping policy development and recommended coverages for businesses – whether tech giants or third-party users of technology. Anthony explains the differences between Cyber and Tech Errors & Omissions (E&O) policies – as well as who needs which and in what combination. He also highlights for Host March Schein, National Co-Chair of the Cyber Center for Excellence, the confluence of factors that make tech companies such attractive targets for threat actors. You’ll learn about the most common – and damaging – cyber liabilities out there; things like network attacks, ransom ware assaults, data breaches, business interruption, data restoration costs and third-party vulnerabilities. And don’t miss our guest’s comprehensive list of best practices to control risk for companies of all kinds, whatever their core business. “Nothing’s a silver bullet, but you can help mitigate potential exposure,” says Anthony, whose Connecticut-based career began in claims before migrating to underwriting. Find out what differentiates The Hartford’s Tech E&O and Cyber insurance solutions and how their team of experts guarantee insureds the best possible outcomes when privacy breaches, data hacks or other negative events occur. (Hint: specialized expertise and preparedness are key!)



    Key Takeaways:



    Why taking a leap and moving to the business side at The Hartford was one of those pivotal choices that changed the course of Anthony’s career – and all too the good!

    From claims to underwriting: How Anthony made the jump and why it has shifted his focus.

    About the collaborative, social elements that define much of the underwriter’s process and goals.

    What’s a Cyber Policy? If you’re doing business of any kind on the internet, then you probably need some form of coverage.

    What’s a Tech E&O Policy? If you providing a tech service of some kind, then you probably need some form of coverage.

    At the intersection: A look at insurance policies that simultaneously cover exposures in the realms of both Cyber and Tech C&E exposure.

    About the evolution of Tech E&O + Cyber and coverages required in an internet economy full of data transmittal, management and risk exposures.

    Why large technology companies are such high-value targets for threat actors eager to double-dip by accessing downstream secondary client information.

    How The Hartford differentiates itself as an established carrier with a wide array of solutions for any business eventuality:



    Stand-alone Tech E&O coverage.

    Tech E&O coverage + cyber coverage.

    A wide variety of mix-and-match options.

    Specialized tech expertise to ensure optimal insurance outcomes.





    About potential cyber liabilities unique to technology firms:



    Network cyber-attacks.

    Ransom ware attacks.

    Data breaches (and related extortion).

    Business interruption.

    Data restoration costs.

    Professional/product exposure due to third-party contractual, regulatory or subrogation issues.





    Supply chain and systemic risk: A closer look at the variety of vulnerabilities passed down to companies impacted by global industry events.

    Recommended best practices to note:



    Perform regular software composition analyses.

    Deploy tools to track vulnerabilities.

    Undertake regular code reviews, including both static and dynamic scans.

    Implement regular in-house or third-party security and resiliency testing.

    Develop a solid IRP (Incident Response Plan).

    • 17 min
    “Is Your Cyber Underwriting Solid? Why You Need the Three-Legged Stool.”

    “Is Your Cyber Underwriting Solid? Why You Need the Three-Legged Stool.”

    Our guest on this episode of Chatting Cyber is at the forefront of Insurtech innovation, deploying new approaches to cyber underwriting (with a ripple effect on traditional insurance). Peter Hedberg, VP for Cyber Underwriting at Corvus Insurance, shares with Host Marc Schein the many ways tech-enabled strategies are transforming the landscape. Says our guest: Heightened engagement among both cyber insurance brokers and policy-holders is yielding a “virtuous cycle” of better bottom-line results! Find out how brokers can help foster alignment and build trust between insurance policy purchasers (often CFOs) and their IT executives (often CIOs, CTOs). You’ll also learn how Corvus offers financial incentives to those who proactively undertake risk self-assessments to reduce liability – a major plus for all concerned. Peter also underscores why it’s so important to put in place a solid three-legged stool: Application, Exposure, Technology. When these elements are in sync, he explains, vulnerability is minimized to everyone’s benefit. Find out where cyber insurers are with developments related to third-party and systemic risk (works in progress!) and how a Minneapolis-born guy who originally got licensed as a traditional insurance broker became one of the most well-respected cyber specialists out there. “The feedback we’re getting from policy-holders is that we are creating an eco-system and environment that is improving their stance,” says Peter. “And I’m just really happy that as an Insurtech I can point to those numbers and that value.”



    Key Takeaways:



     



    Check your complementary skill sets. You may be positioned for a niche specialty!

    How does Insurtech differ from traditional insurance? The focus is on driving down losses through technology-enabled underwriting.

    The Three-Legged Stool of Underwriting: Application, Exposure and Technology.

    Putting the right underwriting elements together creates a profitable “virtuous cycle.”

    Insurtech adds value by generating tech-enabled approaches that drive down losses.

    Corvus Differentiator: It incents policy-holders to engage with proactive risk assessment.

    How can brokers help?



    By proselytizing the idea of cyber policy-holder engagement.

    By fostering alignment between the insured’s buyer (typically a CFO) and their IT leadership (typically a CIO or CTO).





    Third-party wrongful collection of information has surged but ramifications are still actuarially unclear and still being litigated.

    Assessing systemic risk requires nuance and working through unknown liabilities.

    On the horizon for 2024? More frontlines information about how well policy-holder controls are working to control risk.



    Key Quotes:

    “When cyber (insurance) slowly became more of a mainstream product offering they just pointed to me and said: You’re the cyber guy!” - Peter (02:10)

    “The value proposition with Insurtech is just so fundamentally different from insurance.” - Peter (04:20)

    “Insurtech is leveraging technology to create a better policy-holder experience, better value and more profit left over at the end of the year.” – Peter (05:24)

    “Insurtechs have proven that they can grow really fast, but that doesn’t mean they can make money.” - Peter (05:49)

    “Engagement brings dividends to you as a policy-holder. It makes you a safer policy-holder.” – Peter (09:15)

    “We in the cyber market really demanded much better controls on our policy-holders over the last couple of years and a lot of that has been delivered to us.” - Peter (14:25)

    “The feedback we’re getting from policy-holders is that we are creating an eco-system and environment that is improving their stance. And I’m just really happy that as an Insurtech I can point to those numbers and that value.” - Peter (15:58)

    • 16 min
    Cybersecurity In M&A Transactions And The Three-Layer Chocolate Cake Approach With Justin Daniels

    Cybersecurity In M&A Transactions And The Three-Layer Chocolate Cake Approach With Justin Daniels

    In this episode of CHATTINN CYBER, Marc Schein interviews Justin Daniels, an equity partner at Baker Donelson, an AM law 60 firm. Justin worked as a corporate M&A attorney and started doing technology work, before eventually narrowing down to cybersecurity. In today’s episode, he talks about cybersecurity in M&A transactions, explaining in depth his three-layer cake approach to cybersecurity in M&A and the importance of cybersecurity and privacy in all aspects of technology, from individual to business transactions.



    Justin begins by discussing the importance of cybersecurity and privacy for individuals and businesses, particularly in the context of smart contracts and digital wallets used in the crypto space. He emphasizes the need for individuals to shift their mindset and make intelligent choices about sharing their data. He also suggests that individuals take advantage of privacy and security settings on their phones and consider multi-factor authentication.



    He then shifts to cybersecurity in M&A transactions. Justin explains his "three-layer cake" approach to cybersecurity in M&A, which includes asking the right questions, having proper representations and warranties in the purchase agreement, and not integrating the target's network too quickly after the acquisition. He also discusses liability caps and super caps in technology contract negotiations.



    Overall, this conversation stresses the importance and relevance of cybersecurity in all technology business transactions today.



     



    Highlights:



     



    “You have to have a certain period where cybersecurity lasts after the closing. In fact, I make it a fundamental rep where it could last through the statute of limitations, it can get negotiated.”



     



    “Once you own a network, you can send in your security people and try to find any intrusions. And if you can do that, while the network is isolated, that doesn't give the threat actor the opportunity to move laterally onto your network and probably cause a lot more damage.”



     



    Time-Stamps:



     



    [01:06] Justin’s journey into cybersecurity



    [03:17] The importance of smart contracts and digital wallets.



    [05:12] How businesses and individuals can manage privacy and security concerns.



    [07:33] The pros and cons of using private browsers



    [09:35] How important is cybersecurity in M&A?



    [11:27] The three-step approach to cyber security.



    [13:43] Liability caps helpful in M&A negotiations



    [15:17] About Justin's book, Data Reimagined, and how to connect with him online



     



    Connect with Justin:



     



    LinkedIn: https://www.iansresearch.com/our-faculty/faculty/detail/justin-daniels



     



     



     



     



     

    • 17 min
    Cyber Insurance Risks And How To Mitigate Them With Trent Cooksley

    Cyber Insurance Risks And How To Mitigate Them With Trent Cooksley

    In this episode of CHATTINN CYBER, Marc Schein interviews Trent Cooksley, the co-founder and CEO of Cowbell Cyber about his journey into cybersecurity and how he founded one of the most successful cyber insurance companies to date.



    Starting his career as a bond trader on the Chicago Board of Trade, Trent quickly realized that he wasn't cut out for that type of work and decided to learn the ropes of becoming an entrepreneur. After serving Markel Corporation in a variety of different roles for a decade and gaining experience in international insurance business, property lines, professional lines, and acquisitions, Trent decided to build his own company, something he had been putting off for some time. He watched what was happening in the insurtech space and found an opportunity in cyberspace, and ventured in.



    Trent developed proprietary technology that allowed his newly formed company to evaluate the cybersecurity health and hygiene of every business in the United States, which gave it an opportunity to really understand risks when they come in at a much more granular and better level.



    Aside from his journey, Trent also talks about the biggest challenge facing the cyber insurance industry: the rapid and continuous evolution of cyber risks, which requires companies to be proactive and reactive at a rapid pace. He shares that this uncertainty also presents opportunities for those who put themselves in a position to take advantage of them. Cowbell, his company, is working towards finding a long-term solution for their policyholders by continuing to be experts in the space and how they're modeling the risk and understanding the risk.



    Listen to this episode to learn more.



     



    Highlights:



     



    “One of the little things that we do that I think accentuates our culture, we have a really transparent organization. So we like to be transparent. We encourage resiliency, urgency and empowerment.”



     



    “We're continually evaluating the cybersecurity health and hygiene of every business in the United States, the entire market. And that gives us an opportunity to really understand risks when they come in, at a much more granular and better level.”



     



    Time-Stamps:



     



    [01:43] Trent’s business milestones



    [03:42] Challenges with the rapid growth of Trent’s company.



    [06:25] Deep market penetration in the cyber insurance marketplace.



    [08:14] Taking a cross-disciplinary approach.



    [10:18] Understanding risks at a more granular and better level.



    [12:39] How it looks like being the CEO of Cowbell Cyber for a day and the process behind it.



     



    Connect with Trent:



     



    LinkedIn: https://cowbell.insure/team/



     



     

    • 15 min
    How to Prevent Ransomware Attacks in 2023 with Jason Rebholiz

    How to Prevent Ransomware Attacks in 2023 with Jason Rebholiz

    2023 is a totally different year from 2022 when it comes to ransom attacks. Based on the activities on the dark web associated with ransom actors, the numbers are going up. Last year, Russia-Ukraine had the numbers go down, but this year, we have a 102 % increase.



    In this episode of the Chattinn Cyber podcast, we have the pleasure of hosting Jason Rebholiz. He is the chief information security officer at Convus Insurance and owns a YouTube Channel called Teach Me Cyber. Jason’s passion for data security is peerless, and his knowledge of the industry is something we should all want to hear. His career started at Mandiant, where he tried different things and came to learn his passion was in data security.



    Jason and Marc Schein have an in-depth conversation on Ransomware and data security. Jason brings us up to speed with the current ransomware trends in 2023, the groups that are giving data security experts sleepless nights, the effects of AI on data security, and how organizations can keep their data safe.



    Would you like to learn more on how to prevent ransomware attacks? Listen to this episode.



    Key Talking Points of the Episode:



    [02:20] How Jason got into security



    [07:31] Jason’s advice to people who want to join the cybersecurity industry



    [10:22] Ransomware trends in 2023?



    [13:34] Most common ransomware groups



    [16:48] How safe is MFA?



    [20:04] How can organizations beef up their data security?



    [22:01] How is AI impacting data security?



    Standout Quotes from the Episode:



    “Understanding the type of MFA is going to become critically important in the future.”



    “When companies can go in and create this baseline of the security controls, they are going to be more protected against ransomware and other attacks than somebody that does not have that.”



    Connect With Jason Rebholiz:



    LinkedIn: https://www.linkedin.com/in/jrebholz/



    YouTube: https://www.youtube.com/@teachmecyber



     



     

    • 26 min
    Cybersecurity Risks And The Rising Demand For Chief Information Security Officers With James Kim

    Cybersecurity Risks And The Rising Demand For Chief Information Security Officers With James Kim

    In this episode of CHATTINN CYBER, Marc Schein interviews James Kim, the Vice President and Director of Cybersecurity Strategies and Programs at City National Bank in Florida, about the roles and responsibilities of a cybersecurity professional, leveling up into a CISO (Chief Information Security Officer) role, and managing cybersecurity risks in an organization.



    James begins by discussing his path to his current position, attributing his success to luck, ambition, and grit. He started as a help desk technician at a bank and worked his way up over the years, focusing on risk management and developing business acumen. He realized that there was a gap between the technical aspects of cybersecurity and business, which led him to focus on improving the relationship between the two areas. He believes that this focus on developing relationships and maintaining partnerships is critical to his role and cybersecurity more broadly.



    James's day-to-day responsibilities involve incident reviews, working with governance, risk and compliance teams, reviewing policies and controls, managing projects, and tracking various initiatives. He enjoys the variety of tasks and the opportunity to work across the entire spectrum of cybersecurity, including governance, risk and compliance, security architecture, identity and access management, and business continuity and vendor risk management.



    James discusses the future of the CISO role and where he sees himself in five years. He believes that the CISO role will continue to expand in prominence, with more emphasis on managing cybersecurity risks for the organization.



    He concludes the conversation by advising young professionals interested in cybersecurity to know the many different aspects of the field, including governance, risk and compliance programs, cybersecurity auditing, and security engineering and analysis. He also stresses the importance of work-life balance, given the challenging and stressful nature of the work.



     



    Highlights:



     



    “We all have similar responsibilities around maintaining a robust information security or cybersecurity program, ensuring that we have proper processes, procedures in place to report incidents; and at the end of the day, having the appropriate safeguards in place to protect client information or patient information.”



     



    “If you've been kind of following along with current events, I feel that within the next five years, the CISO role will continue to expand and gain more prevalence with management and the board.”



     



    Time-Stamps:



     



    [00:50] How did James get into cybersecurity?



    [02:38] James’s day-to-day responsibilities as a security operations manager.



    [04:04] Working across the entire spectrum of cybersecurity.



    [06:06] Where do you see the Ceo role in five years?



    [08:07] How to promote awareness internally and externally within the organization.



    [10:13] Advice for young professionals trying to enter cybersecurity.



    [12:14] Challenges in the future of cybersecurity.



     



    Connect with James:



     



    LinkedIn: https://www.linkedin.com/in/james7kim/



     



     



     



     



     



     



     

    • 14 min

Customer Reviews

4.8 out of 5
10 Ratings

10 Ratings

Grahda89 ,

Very informative and interesting podcast in the cyber space

I’ve been in the cyber security space for years. This podcasts is a breath of fresh air for cyber geeks. The typical podcast in this space is too technical, but the Host Marc makes takes a much more wholistic approach. Highly recommend.

StephieDash ,

A RISING STAR... KEEP YOUR EYE ON THIS ONE!

This podcast if for sure one to watch, a rising star in the making. The information is captivating, down to earth, and exemplifies everything a cyber security podcast should be! I love listening to the interviews with industry experts as they not only feature news and current events but they also bring a human aspect to the show as they provide some details about their career path and how they got to where they are today. Marc, is as sharp as they come and the potential for this podcast is endless. I am so excited to listen to all of the future episodes!

RomoMarsh ,

Cyber podcast

Great insight and content!!

Top Podcasts In Business

The Ramsey Show
Ramsey Network
Money Rehab with Nicole Lapin
Money News Network
The Diary Of A CEO with Steven Bartlett
DOAC
NerdWallet's Smart Money Podcast
NerdWallet Personal Finance
Planet Money
NPR
The Money Mondays
Dan Fleyshman

You Might Also Like