Please enter the email address for the person you are registering.
Attention: This course is not approved for State reported continuing education credits.
Do you want to add yourself in waitlist for this event?
Already registered
You can not register same event with in 30 days.
Designated participants are only allowed to register for this course.
This Online MEGA is allowed only for CIC, CRM and CPRM Dues Paid designees.
To earn designation update credit in this course, you MUST have paid your annual dues. Please click the link to Pay your Dues
Letter of Good Standing Request
Please enter details below to verify the request.
First Name on License*
Last Name on License*
LIC/NPN*
Please enter details below to verify CE Request.
Do you need state reported CE credits?
Yes
No
In the case of multiple licenses, please enter your resident state license information as CE credit will only be processed for one state. Modifications to your CE request may be made up until the last day of the course through the My Courses tab in your PROfile. Certain states have rules regarding repetition of courses, please review those requirements prior to requesting CE credits.
The State of Nevada has only approved this course for 3 credits of Property & Casualty and 3 credits of Ethics.
IMPORTANT: If you have previously taken this course it is imperative that you review the repetition rules established by your State Department of Insurance as some states do not allow a course to be repeated within a certain period of time.
License State*
First Name on License*
Last Name on License*
LIC/NPN*
Resident License*
Type of License*
Line of Authority*
Decline CE Request
CE Declination Reason
Request saved successfully!
Please wait...
OVERVIEW AND TOPICS
Alternate Funding
Participants will review some of the alternative funding options available to the large risk. Points of interest include a brief overview, the use of guaranteed cost programs vs. the following alternatives: deductibles, retrospective rating plans, self-insurance, risk retention groups, and captives. Each technique is applied to a case study throughout the class.
Understanding the Lloyd's Market
Lloyd’s of London is the world’s leading insurance and reinsurance marketplace. After an overview of Lloyd’s structure, role, and impact on availability of insurance in the U.S., participants will review the different ways insurance risk can come to Lloyds. This will include retail brokers, wholesale brokers, coverholders and reinsurance. They will take an in-depth look at how claims are handled and who is involved in the claims process. Participants will gain a better understanding of how Lloyd’s fits into the insurance delivery model and the benefits it provides to the insurance agent and the insured. As climate, industrial, and scientific changes rapidly disrupt the status quo, society faces risks that are more complex and unpredictable. They will learn how Lloyd’s Lab is the heart of innovation for insurance. They will learn about new insurance products and solutions fit for the needs of emerging and unusual risks and exposures.
The Devil Is In The Details...Cyber Policy Explained
In this session, agents will examine different cyber forms and be able to identify the differences within their insuring agreements, exclusions, and conditions. With over 170 different cyber policy forms in the marketplace, participants will gain better understanding to know which policy is best for the needs of their insureds.
The Anatomy of a Ransom Attack
In 2019, there were 15 organized cyber-criminal groups. Today, there are over 100. With the development of Ransomware-as-a-Service (RaaS), anyone can become an extortionist. This 4-hour course is designed to increase the insurance professional’s knowledge of cyber ransom attacks, the costs, and ways to protect against these attacks. After a brief history of ransomware development, the insurance professional will better understand the current exposures and ways to protect their clients and themselves. The insurance professional will examine how the attack happens and how the threat actor (TA) gets into the computer systems. They will discuss how TAs are using social engineering techniques to gain control of their computer networks and review the different stages of cyber extortion and its complexities. They will identify insuring agreements triggered in a cyber attack and discuss how to insure this rapidly growing exposure.