Flood Basics still causing pain for some
The Standard Formula Podcast | Using an Internal Model to Calculate the Solvency Capital Requirement
The Standard Formula Podcast | Dissecting the Solvency Capital Requirement
Best Practices for Negotiating Manuscript Exclusions
AGG Talks: Healthcare Insights - Episode 1: A Primer for Providers When Insurance Companies Refuse to Pay
The Standard Formula Podcast | Solvency II Back to Basics: Technical Provisions
D&O Insurance Myths (Part 2)
Hinshaw Insurance Law TV | Bad Faith Law
The Standard Formula Podcast | Investment Rules for Insurers and Reinsurers
D&O Insurance Myths (Part 1)
The Standard Formula Podcast | Understanding the UK’s Matching Adjustment Regime
The Standard Formula Podcast | Solvency II Back to Basics: Third Country Branches and Cross-Border Provision of Services
Standard Formula Podcast | Reinsurance and Risk Transfer: Risk Mitigation Under the Solvency II Regime
Hinshaw Releases Second Edition of Duty to Defend: A Fifty-State Survey
Hinshaw Insurance Law TV – Transaction Insurance Solutions
The Standard Formula Podcast | Understanding Insurance Resolution Regimes
The Risk Roundtable: Demystifying the Intersection Between NJ Workers' Comp & Employment Practice Liability
GILTI Conscience Podcast | Tax Insurance 101
Insurance for the Cannabis Industry: Risks & Challenges
The Standard Formula Podcast | International Association of Insurance Supervisors: Who They Are and Their Industry Impact
Cyber risk is now a normal part of our personal and professional lives. When companies suffer a cyber incident, they often look to their insurance policy for coverage to help mitigate the financial exposure. Additional...more
Businesses, public services, and computer users across the world faced disruption as a result of the major CrowdStrike information technology (IT) outage, which is being coined by many as one of the largest and worst cyber...more
The Superior Court of Delaware, applying Delaware law, has dismissed two lawsuits filed by nine insurance companies seeking to recover amounts they paid under cyber liability policies from a software company whose customers...more
Open insurance is a trend gaining traction throughout the global insurance industry. Similar to open banking, it involves the industry moving to a connected data ecosystem powered by open application programming interfaces...more
The Fifth Circuit added to the emerging body of case law addressing the recovery of business income losses in the cyber insurance coverage context to kick-start 2024 in Southwest Airlines Company v. Liberty Insurance. ...more
In this episode of “Don't Take No for an Answer,” host Lynda A. Bennett is joined by David Anderson, Vice President of Cyber at Woodruff Sawyer, and Heather Weaver, counsel in Lowenstein’s Insurance Recovery Group, to discuss...more
The softening D&O market has continued into 2023, with 91% of our clients experiencing a cost reduction in their renewal in the first half of the year. Self-insured retentions have also continued to fall. The soft market is a...more
Cyber insurance is more important than ever, says Eric Jesse, who provides three tips for deriving the most value possible from your cyber insurance policy. Eric advises policyholders to clearly understand the scope of their...more
In a unanimous decision, the Ohio Supreme Court found that appellee EMOI Services, LLC’s (“EMOI”) businessowners insurance policy does not cover losses resulting from a ransomware attack on EMOI’s computer software systems....more
In the last week of December 2022, the Ohio Supreme Court published a much-anticipated decision in the EMOI Services LLC v. Owners Insurance Co. case. The decision was bold, and the court made no attempt to limit its holding...more
While cyber was incorporated in some general liability policies (GL) of the 1980s, the first cyber standalone policy was written in 1997 through AIG. Though groundbreaking, as it was the first to address cybersecurity, it was...more
Reps and warranties insurance (RWI) ensures the policyholder is covered for breach of contract for mergers and acquisition (M&A) transactions. Failures in diligence or fraud on the part of the seller can result in breaches of...more
Multi-factor authentication (MFA) is more than an annoying popup or text message when logging onto a company’s website or platform. Not only is using MFA a sound security practice and good business, it is frequently becoming...more
In the second of a three-part series, Buckingham Data Privacy and Cybersecurity Attorney David Myers talks with Andy Jones, CEO, Fortress Security Risk Management, and Bryan Schauer, Vice President at The Schauer Group’s...more
With news of massive data breaches making headlines in recent years, the handling of personal data has become a focus for legislators and regulators around the world. Compliance with data privacy regulations such as the...more
The U.S. District Court for the Eastern District of Pennsylvania ruled that an insurance policy issued by Federal Insurance Co. excluded coverage for the transmission of $1.3 million by the insured in response to an email...more
Healthcare breaches, including ransomware attacks, continue to increase. As a result, many healthcare organizations seeking cyber coverage to help defray the costs associated with a ransomware attack or other data incident...more
Change is a constant in the world today. This is particularly true of the past two tumultuous years, which saw a worldwide pandemic that impacted nearly every aspect of everyday life. Rapidly advancing technology and...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
Host Lynda A. Bennett is joined by Robert DiRico, National Cyber Liability Practice Leader at ARC Excess & Surplus, LLC, and Shiraz Saeed, Vice President and Cyber Risk Product Leader at Arch Insurance Group, for a deep dive...more
On March 22, 2022, the United States District Court for the District of Minnesota ruled that two ACE insurers were obligated to indemnify Target Corporation (“Target”) for the amounts it paid to settle claims related to...more
In this episode, partners Jeff Meagher and Lucas Tanglen, along with associate Reymond Yammine, discuss the Russia-Ukraine conflict and insurance for state-sponsored cyberattacks, including lessons learned from the NotPetya...more
Cyber incidents are increasing in frequency and severity across all businesses and industries. As the saying goes, it’s not a matter of IF but WHEN an incident will occur. In this webinar we will explore ways that you can...more
In this episode of Lowenstein’s Cybersecurity Awareness series, Ken Fishkin, Lowenstein’s Manager of Information Security, speaks with Lynda A. Bennett, Chair of the firm’s Insurance Recovery Group, about the impact of...more
The “war” exclusion has gotten more attention over the past couple of weeks in light of Russia’s invasion of Ukraine. For good reason. This exclusion, common in property and liability policies alike, typically eliminates...more