Holmes Murphy

DOES YOUR COMPANY USE TECHNOLOGY? IF SO - YOU'RE AT RISK FOR A CYBER BREACH.

It's the worst case scenario: you're on vacation and are notified that a cybersecurity breach has just happened at your company. Your computer systems are locked down. Your employees are not getting paid. There is a message that your company's data is being held hostage unless you pay $10,000 in bitcoin.


You ask yourself: How did this happen? What do we do now? How do we fix this? How do I communicate to our employees? How do I communicate to our customers? What else did they hit?

Learning from a real data breach after it happens is painful and can leave your company with more questions than answers.

Listen to a panel of experts from Dickinson Law, Holmes Murphy, and SBS Cybersecurity who share tips to properly prepare and reduce your risk of a cyber breach and equip your company with the right tools and resources to minimize damage after a breach takes place.

The panelists walk through a real data breach example, including:
    *How fraudsters gain access to your systems
    *Incident Triage Internal and External Communications
    *Managing Liability and Claims
    *Identifying how people, processes, and technology can all lead to breaches
    *How to apply the lessons learned after a breach

Unfortunately, no company in any industry - large or small - is immune to the threat of a cybersecurity breach. 
ON DEMAND WEBINAR
LISTEN NOW!

ABOUT HOLMES MURPHY'S 2018 UNDERSTANDING ART MONTHLY WEBINAR SERIES

Just like our dog in pink rain boots, we want you to be fully prepared for whatever risk mud puddles may come your way. Our approach to helping clients is based on understanding your company’s culture, business, and vision.

The method we take to understand your risk management needs and insurance exposures is our Understanding ART Sales and Service model. That’s why during each month in 2019, our Property Casualty experts will highlight an important topic that focuses on mitigating risk that will provide insight and guidance on the specific steps you can take to improve each area of Avoid, Reduce, and Transfer. 

For more information about upcoming topics, webinar recordings, or supporting materials, please contact [email protected] or your local Holmes Murphy representative.

Into the Breach: Responding to a Cybersecurity Incident from Start to Finish