What Time Does This Start For Me?

Pacific Mountain Central Eastern

OVERVIEW AND TOPICS


After an overview of the structure of the Business Auto Policy, participants will take an in-depth look at the coverages provided by the Business Auto Coverage Form (CA 00 01). They will review the important contract provisions including covered autos (symbols), liability, physical damage, and conditions. They will identify important BAP exclusions and their impact on the insured. They will examine specific BAP endorsements and discuss how they can amend policy provisions, add coverage, or restrict coverage.
Agents will compare and contrast the ISO Commercial General Liability (CGL) Policy with Excess or Umbrella policies that might sit over the top. Understanding the similarities and differences between the language within each form will enable agents to recognize where gaps may be created and have a more in-depth understanding of why those gaps exist.
In 2019, there were 15 organized cyber-criminal groups. Today, there are over 100. With the development of Ransomware-as-a-Service (RaaS), anyone can become an extortionist. This 4-hour course is designed to increase the insurance professional’s knowledge of cyber ransom attacks, the costs, and ways to protect against these attacks. After a brief history of ransomware development, the insurance professional will better understand the current exposures and ways to protect their clients and themselves. The insurance professional will examine how the attack happens and how the threat actor (TA) gets into the computer systems. They will discuss how TAs are using social engineering techniques to gain control of their computer networks and review the different stages of cyber extortion and its complexities. They will identify insuring agreements triggered in a cyber attack and discuss how to insure this rapidly growing exposure.
Cybercrime is the fastest growing crime and constantly evolving. Social engineering attacks are not only becoming more common, but they are also increasingly sophisticated. In this session, participants will learn about new types of cybercrime and how the cyber policy form responds to these unique exposures. Using real-life claim examples, agents will examine social engineering type exposures including cryptojacking, botnets, bricking, sextortion, phishing, whaling, and more.

COURSE DETAILS


DURATION
16 Hours

PRICE
Contact for Details

FORMAT
Webinar

CE CREDIT
Varies by State

INSTRUCTION LEVEL
Master

FINAL EXAM
No Exam

FACULTY BIO


WHO SHOULD REGISTER


REQUEST MORE INFORMATION


*
*

REQUEST MORE INFORMATION


CLICK HERE