www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:d13  Public Scan

Submitted URL: https://go.scmagazine.com/dc/-vMdw_6ux1ia6WSIpe-HqwUBmRtNHNdPPZd5lYTFQknA61F3Pijcrw5R6k24uVjGyciYdjV5QzJNxOt9yJOQVFNAIn1uU...
Effective URL: https://www.scmagazine.com/cybercast/how-ransomware-has-disrupted-the-cyber-insurance-market-and-what-you-can-do-about-it?u...
Submission: On July 19 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="password">Password</label><input placeholder="Password*" required="" type="password" id="password" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="firstName">First Name</label><input placeholder="First Name*" required="" type="text" id="firstName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="lastName">Last Name</label><input placeholder="Last Name*" required="" type="text" id="lastName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="companyName">Company Name</label><input placeholder="Company Name*" required="" type="text" id="companyName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input placeholder="Job Title*" required="" type="text" id="jobTitle" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="phone">Phone</label><input placeholder="Phone*" required="" type="text" id="phone" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="mb-4">
    <div>
      <div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
          alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
    </div>
    <div>
      <div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information
          about upcoming SC Media events, webcasts, and conferences.</label></div>
    </div>
  </div>
  <div class="fs-9 my-4">
    <p>By clicking the Create Account button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions">Terms and Conditions</a><span> and </span><a class="text-underline" href="/privacy-policy">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Create Account</button>
</form>

Text Content

Log inRegister
Topics
Events
Podcasts
Research
Recognition
Leadership
About CRA



HOW RANSOMWARE HAS DISRUPTED THE CYBER INSURANCE MARKET, AND WHAT YOU CAN DO
ABOUT IT!

On-Demand Webcast|1 Hour

The cost of cyber insurance is skyrocketing. In response to a string of
high-profile attacks, record-setting ransomware numbers and government
regulations, insurers are being forced to significantly increase premiums for
cyber coverage. Meanwhile, it’s getting even harder for companies to qualify for
coverage in the first place, as cyber insurance carriers deem some organizations
too big of a risk – denying their applications despite how badly they need
protection. 
Join this webinar hosted by Mimecast to discuss: 


 * The Challenges of Ransomware in light of Cyber Insurance
 * Strategies to understand and quantify your firm’s risk and threat profile 
 * Techniques to demonstrably reduce your attack surface and enhance your
   ecosystem of controls 
 *  Methods to communicate your program’s effectiveness in order to maximize
   cyber insurance coverage while minimizing the financial burden



Neil Clauson

Regional CISO

Mimecast

Neil has 25+ years of experience building and securing complex IT and Security
solutions. He’s led Security Operations teams at Mimecast and other enterprises
which face a variety of threats and challenges, and has built and enhanced
cybersecurity programs to support and achieve business outcomes

Bradley Barth

Director of Community Content

CyberRisk Alliance

As director of community content at CyberRisk Alliance, Bradley Barth develops
content for SC Media online conferences and events, as well as video/multimedia
projects. For nearly six years, he wrote and reported for SC Media as deputy
editor and, before that, senior reporter. He was previously a program executive
with the tech-focused PR firm Voxus. Past journalistic experience includes
stints as business editor at Executive Technology, a staff writer at New York
Sportscene and a freelance journalist covering travel and entertainment. In his
spare time, Bradley also writes screenplays.


SPONSORS


Log in
Register
Business Email
Password
First Name
Last Name
Company Name
Job Title
Phone
Yes, I would like to receive industry news alerts, the Daily Scan, and editorial
updates from SC Media.
Yes, I would like to receive information about upcoming SC Media events,
webcasts, and conferences.

By clicking the Create Account button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Create Account

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2023 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies