Reinsurer Canopius builds global cyber incident team
It consists of members from Sydney, London, and Chicago.
Global speciality reinsurer, Canopius, launched its Cyber Incident Management Team (CIMT) to assist insurers and clients amidst cyber attack disruptions.
With a team of nine members, this new group is available to Canopius cyber policyholders worldwide.
Canopius's Cyber Incident Response service is overseen by team leaders in three international business units: Ellen Brookes in Sydney, Australia; Brendan Helleman in London, UK; and Steven Wesolek in Chicago, US.
Prior to joining Canopius, Ellen Brookes served as a technical support specialist at K&L Gates, a global law firm. Prior to her role at K&L Gates, she held senior customer service positions in various organizations in Western Australia for six years.
Brendan Helleman joined Canopius from Meta, where he worked as a case manager on the privacy and data policy team. Prior to that, he served for two decades in the British Army and the UK Ministry of Defence.
ALSO READ: Canopius launches digital asset custody product in Lloyd's Asia platform
Whilst Steven Wesolek brings almost ten years of experience in information security and incident response to his new role. He joined Canopius from McDonald's, a global fast food chain, where he held the position of security incident response supervisor.
In addition to the three regional team leaders, the global team at Canopius includes six more members based in Sydney, London and, Chicago.
The CIMT takes charge of coordinating interactions with specialist services such as lawyers, data forensics, and PR and reputation experts on behalf of the insured, aiming to restore normal business operations as quickly as possible.
As part of this service, Canopius policyholders also enjoy preferential rates for specialised cyber incident service providers, granting them access to cutting-edge technology and professional expertise.
Additionally, Canopius' CIMT offers pre-event risk mitigation services, including simulated hacking exercises that expose vulnerabilities in insured computer systems.