third-party cyber risk management
Threatonomics

Resilience’s NetDiligence Beverly Hills 2023 Recap

Five Events from NetDiligence, Beverly Hills.

by Davis Hake , Co-Founder & VP of Communications
Published

NetDiligence’s Cyber Risk Summits have become a staple of networking and mindshare for the entire cyber insurance industry. This year, Resilience led over a half dozen of our own events to share research on changing cybercrime trends, rising threats to and from third-party vendors, and how new GenAI-based strategies could be leveraged by cybercriminals.

Breach Breakfast by Resilience, Tom Egglestone, Head of Global Claims, Resilience; Aaron Sherman, Coveware; Davis Hake, Co-Founder, Resilience.

Launching their Mid-Year 2023 Claims Report, Resilience held an intimate breakfast discussion with incident response and law firm partners the first morning of the conference. Tom provided an overview of the report’s findings showing that while ransomware trends showed 2023 on track to be a record-breaking year for cybercrime, fewer and fewer companies were making extortion payments to resolve an incident. This data was correlated by Aaron Sherman, representing the work Coveware has done tracking the ransomware market on a monthly basis. Aaron also provided a first-hand account of what it was like negotiating with ransomware criminals and ideas on how generative AI would help increase the ability of fraudsters to social engineer victim companies. 

Cyber Resilience Workshop by Resilience, Si West, Director of Customer Engagement, Resilience.

Resilience hosted a number of broker partners for an in-depth discussion on what exactly cyber resilience meant, and how it could be put into practice with live scenarios. The concept of cyber resilience involves understanding an organization’s cyber value-at-risk from a financial perspective, and working to prioritize cybersecurity investments that allow the organization to take a hit and continue operating. Si walked through a preview of a new blueprint for how Resilience is working with its clients and then led a tabletop breach scenario so that brokers can see firsthand how he and his team work with clients 1 on 1. Some Resilience team members, like CEO  Vishaal “V8” Hariprasad and SVP of Product Kurt Van Etten dusted off their cyber skills to join in with the brokers for a great afternoon session. 

Risks of Doing Business with Unsecured Third Parties Panel, Stu Panensky (M), FisherBroyles, LLP; Ryan Coyne, Experian; Tom Egglestone, Resilience; Mark Grazman, Fenix24; Matthew Saidel, FTI Consulting. 

Tom Egglestone joined a senior panel of legal and incident response experts to discuss how insurers have been reacting to an increase in attacks against clients through trusted third-party vendors. While outsourcing any business function inherently leads to more risk, companies face ever-growing pressures to support remote working or improve productivity. Incidents like the MOVEit attacks are having ripple effects across insure’s’ claims portfolios as they see second and third-party victims from the attacks. Handling these cases also presents some different hurdles for incident response and claims teams to clear. The panel discussed how establishing responsibility for who is handling the incident early on is vital, the vendor or the victim. They also left two key bits of advice. First, look beyond your organization’s borders. Ultimately, we all exist in an ecosystem where our clients are both users and suppliers of IT services. Guidance to clients should account for their position in the supply chain, as well as vendors within their own supply chain, as part of a holistic approach to cyber risk management. Second, organizations should move away from static approaches to vendor risk management. Current approaches see heavy investment in due diligence and recertification stages. Just like other areas of cyber risk, constant adaptation and monitoring is key to ensuring you’re resilient to reasonably plausible losses.

Hacker Salon by Resilience, Justin Shattuck, CISO, Resilience. 

In a standing-room-only event, Resilience CISO Justin Shattuck walked broker partners through a hands-on hacking lab to demonstrate techniques and tactics used by cybercriminals against their clients. The class of insurance brokers took on the role of “initial access brokers,” threat actors who conduct recon to gain access into enterprise networks. Looking at cyber risk from this POV, they learned the basics of cybercrime economics, the Lockheed Martin Cyber Kill Chain, and how criminal organizations are structured. Justin then led the class through how criminals select targets and gather open-source intelligence, then leveraged ChatGPT to build sophisticated spearphishing lures based on the gathered intelligence. Ultimately, these labs are designed to help brokers better understand the technical side of their clients’ cyber exposure and how to help make them harder targets for cybercriminals. 

Recharge Wellness Series by Resilience, Ingrid Smith, Director of Marketing; MaryKate Broderick, Assistance Marketing Manager, Resilience. 

While everyone was busy empowering their brains, the Resilience team and guests also took the opportunity to recharge their bodies and spirits, with a series of events every morning of the conference. Starting with a rooftop spin session on Monday, early risers were treated to a relaxing hour-long yoga session on Tuesday, and an intense boot camp to round out the week on Wednesday. A fresh juice bar awaited the participants to help shake off the conference cobwebs and start their days strong. 

Along with Resilience’s yearly reception party, it was a packed week at NetDiligence. If your organization is interested in learning more about cybercrime trends or getting hands-on experience with Resilience security experts, please reach out to our team at wwwcyberresiliencecom.kinsta.cloud/contact-us. We’ll see you next year in Miami for NetDiligence, Florida!

You might also like

Why vendor discovery matters now (and how most organizations get it wrong)

The average enterprise relies on hundreds—sometimes thousands—of third-party vendors to operate. Yet when security leaders are asked for a complete inventory of these vendors, the response is often a patchwork of spreadsheets, outdated procurement lists, and educated guesses. This vendor blindness isn’t just an operational inconvenience—it’s a critical business risk that’s becoming increasingly expensive to […]

The healthcare cybersecurity crisis that’s costing organizations millions in damages

The U.S. healthcare sector faces an unprecedented cybersecurity crisis. With 168 million healthcare records breached in 2023 and ransomware attacks surging 32% in 2024, the industry confronts threats that have evolved beyond data theft to sophisticated campaigns capable of paralyzing critical patient care infrastructure. Despite these trends, cybersecurity often receives insufficient leadership attention. A 2025 […]

Your cyber insurance policy could be a target

Organizations invest heavily in cyber insurance policies to shield their businesses from evolving threats, but many overlook a critical vulnerability: the security of the insurance policy documents themselves. While these policies are designed to protect you from cyber threats, they can become powerful weapons when they fall into the wrong hands. Over the past year, […]

A complete guide to domain spoofing

Domain spoofing is a cyberattack technique most commonly used in phishing and fraud, where criminals impersonate a legitimate organization’s domain name to deceive users. Think of it as digital identity theft at scale: Attackers make fraudulent emails or websites appear as if they originate from your trusted company domain, tricking victims into revealing sensitive data, […]

The 3 types of CISOs: How to succeed in any version – and what to do when you’re misaligned

As the CISO, are you and your organization in alignment? The CISO role has evolved dramatically over the past decade, but organizational cybersecurity programs have not always kept pace.  If you think about CISOs like software versions, version 1.0 is your first generation of CISOs, focused on structure and technical architecture. Version 2.0 moves beyond […]

The Security Squeeze

One of the most important features of the Resilience SaaS platform is our Quantified Cyber Action Plan. It supports CISOs making decisions under risk and uncertainty by providing a prioritization for which cyber controls should be implemented, based on their ROI. The power of this approach lies in the fact that it guides the most […]