James A. Harvey. Partner

Size: px
Start display at page:

Download "James A. Harvey. Partner"

Transcription

1 James A. Harvey Partner Jim is a partner in the Technology, Privacy & IP Transactions Group and co-chairs the firm s Privacy & Security task force. His practice leverages both his experience in board level technology and outsourcing projects and his experience in sophisticated privacy, security and network intrusion issues. James A. Harvey Alston & Bird LLP One Atlantic Center 1201 West Peachtree Street Atlanta, GA jim.harvey@alston.com Services Intellectual Property IP and Technology Transactions Global Business Strategies Global Sourcing Health Information Technology HIT Task Force Investigations - Government and Special Payment Systems Privacy and Security Technology Technology and the Internet Alston & Bird Global Privacy and Security Network (ABPSN) Education University of North Carolina (J.D., 1988) University of Arkansas (B.A., 1983) Admitted to Practice Georgia Jim has worked on numerous transformative technology initiatives, including a range of IT, BPO, HR, F&A, facilities management, ERP, cloud, ecommerce/online, open source and social media engagements. Privacy and security are central issues in nearly every technology and data centric initiative in Jim s practice. Accordingly, he has worked extensively with clients on privacy and security issues and initiatives for a number of years, including having founded the firm s privacy task force in 1998, which was the same year he wrote one of the first U.S. articles on the EU Data Directive. This includes extensive work on behalf of financial services, health care, telecommunications and other regulated companies, retailers, online advertising issues and international data transfer issues. His practice also involves security breach management and response, including everything from notification of the affected individuals, to e- discovery and internal investigations and law enforcement issues. Jim worked with a number of partners to form the firm s Security Incident Management and Response Team, a unique team devoted to cyber and security crisis management and response. Representative Experience Privacy and Data Security: Represented a leading payment processing company in all phases of unauthorized intrusion into their network and all associated third party actions and proceedings. Assisting an international retailer in a comprehensive overhaul of its privacy, security, PCI and data management practices, while counseling the company in an FTC and multiple state attorneys general investigations. Advising one of the world s largest interactive marketing providers in an international criminal network intrusion involving records of more than 60 million individuals worldwide. Advising one of the world's largest Internet and concerns on its implementation of safe harbor compliance obligations with its worldwide network of edge network providers.

2 Assisting one of the world's largest investment banks in its implementation of the Red Flag Rules. Advising a major retailer in a breach involving more than 1 million names and social security numbers in all fifty states. Assisting an offshore multinational bank and financial services entity on its data gathering, use and transfer compliance program spanning 10 jurisdictions and three continents, including the EU. Assisting one of the world s largest private companies in design, development and compliance initiatives for a consolidated data base of employee information for more than 700 subsidiary companies in more than 20 countries. Sourcing/Technology Multiple comprehensive outsourcings and renegotiations of IT and processing infrastructure on behalf of Fortune 100/500 members, spanning multiple source and destination jurisdictions and continents. Representation of a UK private equity investment group in the acquisition of a U.S.-based outsourcing provider in the health care space and subsequent move of substantially the entire service delivery infrastructure offshore. Representation of one of the world's largest hybrid public-private banking concerns in the integration and license of a comprehensive Enterprise Resource Planning system involving operations in at least 23 countries. Representation of one of the world's largest money managers in the "transfer" portion of a Build/Operate/Transfer transaction, addressing tax, benefits, intellectual property and other issues arising in moving approximately 500 FTEs from a niche provider's facilities in a Software Technology Park in India to a newly created Special Economic Zone. Unique BPO transaction on behalf of a Fortune 200 insurer, sourcing novel and core aspects of regulated activities to an Indian service provider. Representation of a state agency in its acquisition of development and fiscal agent services in a Medicare/Medicaid implementation processing approximately $12 billion per year in health care related payments. Multiple comprehensive and single-process HR transactions,

3 including one transaction involving 43 client jurisdictions and two of the largest five HR transactions during 2009 and Multiple applications development and maintenance and business process transactions, including finance and administration, transaction processing, procurement and customer care transactions (onshore, offshore and near-shore, including jurisdictions as diverse as Canada, Ireland, Ghana, Guatemala, India, Philippines, Vietnam, China, Rumania and Poland). Memberships Recognized for a number of years as one of America's Leading Lawyers for information technology matters. Recognized for a number of years as one of America's leading lawyers in business process outsourcing by Chambers USA. Active participant in the Free Software Foundation's efforts to develop version 3.0 of the General Public License. Current vice chair and former chair of the Technology Section of the State Bar of Georgia Member of the Intellectual Property Section Recognized as one of Georgia s Super Lawyers for a number of years Recognized as one of Georgia s Best Lawyers Selected as an IP Star by Managing IP for 2013 Member, Phi Beta Kappa Member, Board of Trustees, Atlanta International School

4 Todd S. McClelland Partner Todd is a member of Alston & Bird's Security Incident Management and Response Team, advising clients in connection with incident response and other information security-related issues. Todd has particular experience with PCI/payment system compliance, HIPAA-related incidents, critical infrastructure security, global privacy compliance, risk assessments, and IP theft. Todd also represents clients in connection with outsourcing transactions, IP licensing and audits, and cloud transactions. Todd S. McClelland Alston & Bird LLP One Atlantic Center 1201 West Peachtree Street Atlanta, GA todd.mcclelland@alston.com Services Security Incident Management and Response Sourcing & Complex Procurement Intellectual Property IP & Technology Transactions Mechanical Patents Digital Commerce & the Internet Privacy & Security Alston & Bird Global Privacy and Security Network (ABPSN) Government Contracts Education Florida State University (J.D., 1998) Georgia Institute of Technology (B.ME, 1994) Admitted to Practice U.S. Patent and Trademark Office Georgia District of Columbia Todd is a frequent speaker at professional seminars (including the CISO Executive Network) and author of articles on topics such as cybersecurity, active defense, security incidents, global data privacy compliance, smart grid, cloud computing, and IP protection. Todd is featured in Chambers USA for his outsourcing practice. He is a past chair of the IP Section of the State Bar of Georgia. Todd received his J.D. in 1998 from Florida State University where he was a member of the Law Review and was the executive editor of the Journal of Land Use and Environmental Law. He received a B.S. in mechanical engineering, with high honors, in 1994 from the Georgia Institute of Technology (Georgia Tech). Prior to law school, Todd worked as an engineer designing automation systems for companies such as Coca-Cola and the Ford Motor Company. Representative Experience Advising entities (hospitals, payment processors, retailers, financial institutions, and others) in connection with data security incidents, both in response to incidents and proactive preparation. Advising a global hospitality company on its data security strategy and incident response. Representing a power distribution concern in a state-wide comprehensive smart grid initiative. Advising a top tier pharmaceutical company in connection with the outsourcing of its IT environment and its global privacy compliance. Representing a global transportation company in outsourcing

5 components of its IT platform, international F&A functions, ADM functions, and other business functions. Advising an international payments processing company in the outsourcing of core IT functions. Representing one of the largest big-box home improvement stores in the outsourcing of infrastructure management services. Representing a large independent power producer in connection with the sourcing of multiple HR and IT processes. Recent Publications and Events Innovative Smart Grid Projects (November 7, 2012 Seminar). CISO Executive Network: Application and Third Party Security (October 2012 Seminar). CISO Executive Network: Information Lifecycle Management (September 2012 Seminar). CISO Executive Network: Endpoint Security Management Including Mobile Devices (June 2012 Seminar). CISO Executive Network: Virtualization and Cloud Computing Security (May 2012 Seminar). CISO Executive Network: Security Operations with a Special Focus on Event and Log Management (March 2012 Seminar). CISO Executive Network: Identity Management and Access Control (February 2012 Seminar). UCLA Anderson IS Associates Fall Meeting: The Cloud Through a Legal Lens (November 9, 2011 Seminar). Exploring the Outsourcing Implications of India s Recently Released Privacy Rules, Outsourcing and Privacy & Security Advisory, June 21, Cloud Computing: Watch Out For the Lightning! (March 30, 2010 Seminar). What Else Should Keep You Up at Night Trends in Data Security and Behavioral Marketing (September 17, 2009 Seminar). Memberships State Bar of Georgia

6 U.S. Patent and Trademark Office Founding member of the Atlanta chapter of the Cloud Security Alliance International Association of Privacy Professionals (IAPP) CISO Executive Network

7 Kimberly Kiefer Peretti Partner Kimberly Kiefer Peretti Alston & Bird LLP 950 F Street, NW Washington, DC kimberly.peretti@alston.com Services Privacy & Data Security Security Incident Management & Response Team Litigation Foreign Corrupt Practices Act (FCPA) Violations Government & Internal Investigations Payment Systems Education University of Munich, Germany (LL.M., 1997) Master's Thesis: Conflicts of interests of institutional investors in German stock corporations Georgetown University (J.D., 1996) Journal: Law & Policy in International Business, Magna cum laude University of Wisconsin (B.A., 1992) Major: Behavioral Science and Law, Phi beta kappa Admitted to Practice District of Columbia Illinois Kimberly (Kim) Kiefer Peretti is a partner in the firm s White Collar Crime Group and co-chair of our Security Incident Management and Response Team. Ms. Peretti is also a former director of PricewaterhouseCoopers cyber forensic service practice and a former senior litigator for the Department of Justice's Computer Crime and Intellectual Property Section. She focuses her practice on managing complex, technical electronic investigations and responses, often resulting from cyber intrusions and data breaches. She also services a wide range of clients in matters of cybersecurity; privacy; financial crime, fraud and regulation; payment systems compliance and risk mitigation; economic espionage; and intellectual property theft. While at the Department of Justice, Kim led several benchmark cybercrime investigations and prosecutions, including the prosecution of the infamous TJX hacker Albert Gonzalez, currently serving 20 years in prison for his role in the largest hacking and identity theft case ever prosecuted by the department. Kim is regularly quoted in the media and is a frequent keynote speaker and lecturer. She was featured in both a New York Times Magazine cover story and a CNBC documentary for her role in the prosecution of Gonzalez, appeared on MSNBC s Up with Chris Hayes, and has been recognized as an information security "industry pioneer" by SC Magazine. Top Secret clearance and SCI access (eligible). Representative Experience Represented a global payment processor in connection with a technical, complex computer crime investigation involving a sophisticated cyber threat actor. The crisis response effort included advising on a myriad of legal issues including securities law guidance, regulatory issues, class action defense governmental investigations, insurance coverage and issues. The effort also included supervising and managing a complex cyber forensic investigation that included a rapid response to a sophisticated intruder with deep and persistent access to the environment, development of containment, eradication, and remediation strategies, and coordination of the activities of multiple third parties including an independent forensic investigator,

8 Languages German several payment card brand networks, financial regulators and federal law enforcement. Represented one of the world s largest interactive marketing services providers in a massive network breach, involving more than 60 million individual records. Worked with a global energy company suspected of being compromised by Advanced Persistent Threat actors. The response including enhanced monitoring of critical systems, preventative forensics including a breach indicator assessment, a review of existing investigation and law enforcement information, and assisting management with briefings to executives. Representative Cyber Law and Cyber Security Worked with a global transportation company in developing cybersecurity policies and strategies. The project included ongoing monitoring of federal government initiatives with respect to critical infrastructure cybersecurity and development of appropriate responses, policies, and procedures related to cyber intelligence gathering, information sharing, and cybersecurity practices. Extensive work with a range of Fortune 250 companies on securities disclosure issues arising from cyber risks. These engagements included companies with particular cyber risks and those that have suffered network intrusions and then have to deal with related securities reporting issues. Consulting with a number of domestic and international banks on their response to and preparation for recent, highly-sophisticated and suspected state-sponsored DDoS attacks on their networks. Worked with an international monetary organization in connection with a multi-phased, comprehensive information security risk assessment based on the global information security standard ISO Our involvement included leading a threat-modeling workshop to assist the company in understanding the client s current threats and defenses and identify any known gaps in the information security infrastructure in particular with respect to sophisticated attacks, such as Advanced Persistent Threat. Worked with a multi-services organization in connection with a multiphased, enterprise security risk assessment in which we led an incident response workshop and cyber tabletop exercises to identify any known weaknesses in incident response process and procedures, in particular with scenarios related to sophisticated cyber attacks and intrusions.

9 Worked with a large global consulting firm in an assessment of the company s practices, controls, policies, and procedures with respect to the ease with which sensitive client data and company confidential data could leave the company s systems, whether by an inadvertent act by an employee or a malicious act by an insider or an outsider. Representative Privacy-related Regulatory Inquiry Represented a number of clients in relation to federal and state regulatory inquires involving Internet-based practices potentially violating federal and state unfair and deceptive trade practices acts, including a large online advertising company s practices with respect to the use of third party cookies, a mobile phone carrier s practices with respect to a user s browser s experience, and an automotive dealership s practices with respect to collecting user information and monitoring user behavior online. Memberships United States Supreme Court o o o United States Court of Appeals for the Ninth Circuit United States Court of Appeals for the District of Columbia Circuit United States District Court for the District of Columbia Certified Information Systems Security Professional (CISSP) ABA, Section of Science and Technology Law and Litigation Section Selected Publications "Evolving DDoS Attacks Provide the Driver for Financial Institutions to Enhance Response Capabilities," The Banking Law Journal, June Challenges in Conducting Breach Investigations: Part 2, Law360, April "Challenges in Conducting Breach Investigations: Part 1," Law360, March 25, Compliance with Payment Card Industry Data Security Standard, Proskauer on Privacy: A Guide to Privacy and Data Security Law in the Information Age, Practising Law Institute, February 2011 (co-author of chapter). Data Breach and Encryption Handbook, ABA Publishing, February 2011 (contributor).

10 Data Breaches: What the Underground World of Carding Reveals, Santa Clara Computer and High Technology Journal, Vol. 25, January 2009 (author) (this article resulted in a hearing before the U.S. House of Representatives Homeland Security Committee to consider vulnerabilities in the payment card industry). Prosecuting Computer Crimes, U.S. Department of Justice, February 2007 (contributor). Recent Speeches Presenter, "Women in Cyber Security, Why Women Don't Ask: The Challenges of Promotion and Is In-House Counsel 'Women's Work?'" Georgetown Women s Law Forum, June Presenter, The Cybersecurity Risks to Business, Governments and Individuals, Practising Law Institute s Seminar, Information Technology Law Institute 2013: Privacy and Cybersecurity, Mobile Advertising, Digital Distribution, Social Media and Third Industrial Revolution, April Presenter, The Cyber Threat Landscape: New Themes in Prevention, Detection and Response, RSA Conference 2013, February Presenter, Digital Forensics: Civil vs. Criminal, Fourth Annual Electronic Discovery and Digital Evidence (EDDE) Practitioner s Workshop, January Panelist, Senior Executive Panel: The Faces of Courage in Women's Leadership, Working Mother Media's Leadership Summit for Women in National Security Careers, May Presenter, Computer Hacking The Threat to Personal and Business Security, PLI's Information Technology Law Institute 2012, April Keynote, Cyber Criminals: Who are they? Why are they successful? How do we respond?, University of Michigan Information Security Conference, October 2011.

Solo Practitioner Beverly Hills, California 1989-1998

Solo Practitioner Beverly Hills, California 1989-1998 NINA MARINO 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90212 Tel: (310) 557-0007 marino@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino, PC Beverly Hills, California 1998-present Solo

More information

Walter F. Brown Jr. Profile. Practices. Education. Honors. Partner White Collar, Investigations, Securities Litigation & Compliance.

Walter F. Brown Jr. Profile. Practices. Education. Honors. Partner White Collar, Investigations, Securities Litigation & Compliance. Partner White Collar, Investigations, Securities Litigation & Compliance San Francisco (415) 773-5995 Profile Walter F. Brown, Jr., a partner in the San Francisco office, is a seasoned trial lawyer and

More information

President of the Virginia State Bar June 2013-June 2014. Member of the Executive Committee of the Virginia State Bar and its governing Council

President of the Virginia State Bar June 2013-June 2014. Member of the Executive Committee of the Virginia State Bar and its governing Council PROFESSIONAL EXPERIENCE Sharon D. Nelson, Esq. President Sensei Enterprises, Inc. 3975 University Dr., Suite 225 Fairfax, VA. 22030 703-359-0700 (Phone) 703-359-8434 (Fax) snelson@senseient.com (e-mail)

More information

KENNETH A. ADLER Partner and Chair, Technology and Outsourcing Practice Group

KENNETH A. ADLER Partner and Chair, Technology and Outsourcing Practice Group Partner and Chair, Technology and Outsourcing Practice Group 345 Park Avenue New York, New York 10154 Direct 212.407.4284 Fax 212.202.6039 kadler@loeb.com Kenneth Adler specializes in complex global and

More information

KENNETH A. ADLER Partner and Chair, Technology and Outsourcing

KENNETH A. ADLER Partner and Chair, Technology and Outsourcing Partner and Chair, Technology and Outsourcing 345 Park Avenue New York, New York 10154 Direct 212.407.4284 Fax 212.202.6039 kadler@loeb.com Kenneth Adler specializes in complex global and domestic outsourcing

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

How To Defend A Company In A Securities Fraud Case

How To Defend A Company In A Securities Fraud Case Thomas O. Gorman Porter Wright Morris and Arthur tgorman@porterwright.com Tel: 202-778-3004 Fax: 202-778-3063 1919 Pennsylvania Avenue, N.W., Suite 500 Washington, D.C. 20006-3434 Career Highlights Mr.

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Michelle Peirce PRACTICE AREA: LITIGATION

Michelle Peirce PRACTICE AREA: LITIGATION PRACTICE AREA: LITIGATION Michelle R. Peirce is Co-Chair of the firm s Litigation practice, devoting her time equally to complex civil litigation and white-collar criminal defense. She is a past president

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

President of the Virginia State Bar June 2013-June 2014. President of the Fairfax Law Foundation July 2014-July 2015. Board Member 2002-present.

President of the Virginia State Bar June 2013-June 2014. President of the Fairfax Law Foundation July 2014-July 2015. Board Member 2002-present. PROFESSIONAL EXPERIENCE Sharon D. Nelson, Esq. President Sensei Enterprises, Inc. 3975 University Dr., Suite 225 Fairfax, VA. 22030 703-359-0700 (Phone) 703-359-8434 (Fax) snelson@senseient.com (e-mail)

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Special Report The HITECH Act

Special Report The HITECH Act Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known

More information

Cynthia E. Jones. David A. Clark School of Law, University of the District of Columbia Summer 1996 Adjunct Instructor (Appellate Advocacy)

Cynthia E. Jones. David A. Clark School of Law, University of the District of Columbia Summer 1996 Adjunct Instructor (Appellate Advocacy) Cynthia E. Jones Teaching Experience Assistant Professor of Law Fall 2004-present Visiting Professor 2002-2004 Courses: Evidence, Criminal Law, Criminal Procedure and Race, Crime and Politics seminar George

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Douglas M. DePeppe Cyberlaw Attorney

Douglas M. DePeppe Cyberlaw Attorney Douglas M. DePeppe Cyberlaw Attorney doug@aspireip.com Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate

More information

Lawrence D. Finder. Practice description. Practice focus

Lawrence D. Finder. Practice description. Practice focus Practice description Larry Finder has extensive experience in government investigations, corporate compliance counseling, federal grand jury, trial practice, internal investigations and business crimes.

More information

Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from

Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from The University of Michigan in May, 1987. In 1990, he

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

ALI-ABA Audio Seminar

ALI-ABA Audio Seminar ALI-ABA Audio Seminar Tiffany v. ebay: Roadmap for Avoiding Liability or Short Detour for Trademark Owners? August 6, 2008 Telephone Seminar/Audio Webcast PROGRAM SCHEDULE FACULTY PARTICIPANTS FACULTY

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

Charles A. De Monaco Partner

Charles A. De Monaco Partner Charles A. De Monaco Partner Pittsburgh, PA Tel: 412.394.6929 Fax: 412.391.6984 cdemonaco@foxrothschild.com Charles concentrates his practice in securities litigation and director and officer liability,

More information

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013

Cybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013 Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013 Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not

More information

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats; GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity

More information

Special Assistant City Attorney Prosecuted criminal violations for the City of Minneapolis, 1994

Special Assistant City Attorney Prosecuted criminal violations for the City of Minneapolis, 1994 Edward B. Magarian Partner Co-Chair, White Collar Crime and Civil Fraud Dorsey & Whitney LLP Suite 1500 50 South Sixth Street Minneapolis, MN 55402-1498 (612) 340-7873 : phone (612) 340-2807 : fax magarian.edward@dorsey.com

More information

BARRY L. GROSSMAN OF COUNSEL 777 E WISCONSIN AVENUE MILWAUKEE, WI 53202-5306 (414) 297-5724 BGROSSMAN@FOLEY.COM

BARRY L. GROSSMAN OF COUNSEL 777 E WISCONSIN AVENUE MILWAUKEE, WI 53202-5306 (414) 297-5724 BGROSSMAN@FOLEY.COM BARRY L. GROSSMAN Barry L. Grossman is of counsel with Foley & Lardner LLP. Mr. Grossman is a member of and past leader of the Mechanical & Electromechanical Technologies and Trademark, Copyright & Advertising

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

How To Write A Book

How To Write A Book THOMAS B. HEFFELFINGER RESUME Personal Education Office: Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

THOMAS B. HEFFELFINGER

THOMAS B. HEFFELFINGER THOMAS B. HEFFELFINGER RESUME Personal Education Office: Best & Flanagan LLP 60 South Sixth Street, Suite 2700 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897

More information

STEPHEN J. COSENTINO Partner

STEPHEN J. COSENTINO Partner STEPHEN J. COSENTINO Partner stephen.cosentino@stinsonleonard.com 816.691.2450 1201 Walnut Suite 2900 Kansas City, MO 64106 Steve Cosentino, an innovative leader in the information technology, software

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

Robert D. Piliero Representative Matters Financial Services

Robert D. Piliero Representative Matters Financial Services Butzel Long :: Lawyers & Professionals :: Robert D. Piliero Robert D. Piliero Robert D. Piliero is a shareholder practicing in Butzel Long s New York office. He graduated from the Wharton School of Finance

More information

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator

More information

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

J. D.,University of La Verne School of Law, California 1989. United States Court of Appeal,Ninth Circuit 1990

J. D.,University of La Verne School of Law, California 1989. United States Court of Appeal,Ninth Circuit 1990 NINA MARINO 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90212 Tel: (310) 557-0007 kaplan@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino,PC Beverly Hills, California 1998-present Solo

More information

Program. Faculty Directory

Program. Faculty Directory Department Telfer Going of Finance Global Canada Anti-Corruption Executive Leadership Program Program Faculty Directory Marvin Hough Telfer Executive in Residence Academic Director 30 Year Career at Export

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

PATENT LITIGATION IN US AND GERMANY SEMINAR THOMSON REUTERS, LEGAL CORDIALLY INVITES YOU TO

PATENT LITIGATION IN US AND GERMANY SEMINAR THOMSON REUTERS, LEGAL CORDIALLY INVITES YOU TO THOMSON REUTERS, LEGAL CORDIALLY INVITES YOU TO PATENT LITIGATION IN US AND GERMANY SEMINAR There are still significant differences within the three major business centers of China, USA and Europe on patent

More information

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski

Freelance Lawyers. The industry's best kept secret. Christopher Kozlowski Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University

More information

Email Data Security. The dominant business communication tool

Email Data Security. The dominant business communication tool Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

KAREN KINCAID BALMER, CPA, CFF, CFE, CrFA

KAREN KINCAID BALMER, CPA, CFF, CFE, CrFA KAREN KINCAID BALMER, CPA, CFF, CFE, CrFA Forensic Accounting and Litigation Services Contact Information: 917-301-5897 320 East 46 th Street 5G, New York, NY 10017 karenbalmer@kcfacpa.com As a Certified

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Anatomy of a Privacy and Data Breach

Anatomy of a Privacy and Data Breach Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions

More information

Bernice P. (Bernie) Dixon

Bernice P. (Bernie) Dixon Bernice P. (Bernie) Dixon Bernice P. Dixon is the Chairman and CEO of Atlanta Technology Angels and Founder and CEO of Advising Angels. Bernie has been passionate about leveraging her positions as a senior

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

PROFESSIONAL EXPERIENCE:

PROFESSIONAL EXPERIENCE: ROBERT R. KUEHN Washington University School of Law Campus Box 1120 One Brookings Drive St. Louis, MO 63130-4899 phone (314) 935-5706 fax (314) 935-5356 rkuehn@wulaw.wustl.edu PROFESSIONAL EXPERIENCE:

More information

aug 15 Tax PRacTice GROUP

aug 15 Tax PRacTice GROUP aug 15 Tax PRacTice GROUP OUR Tax Practice Pestalozzi s Tax practice group advises clients in Switzerland and abroad on the complete range of domestic and international tax laws. We are a business law

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

Clients Legal Needs in HIPAA Security Compliance

Clients Legal Needs in HIPAA Security Compliance Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law

CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law CURRICULUM VITAE BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com PROFESSIONAL POSITIONS: Partner, Kostelanetz & Fink, LLP 7 World Trade Center New York, New York 10007 Adjunct Professor, Taxation

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Sills Cummis & Gross P.C.

Sills Cummis & Gross P.C. JACK WENIK member of the firm co-chair of the health care government investigations practice group SPECIALTY: AREAS OF EMPHASIS Health Care Fraud Internal Investigations Doctor Disciplinary Proceedings

More information

Intellectual Property Attorneys LLP

Intellectual Property Attorneys LLP Intellectual Property Attorneys LLP Price Heneveld LLP is an internationally recognized law partnership specializing in all areas of intellectual property patent, trademark, and copyright causes, technology-related

More information

EnCase Enterprise For Corporations

EnCase Enterprise For Corporations TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA. Telephone: +1212 909 6696 Fax: +1212 521 7696 E-mail: dhbernstein@debevoise.com

WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA. Telephone: +1212 909 6696 Fax: +1212 521 7696 E-mail: dhbernstein@debevoise.com ARBITRATION AND MEDIATION CENTER WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA David H. BERNSTEIN Partner Debevoise & Plimpton LLP 99 Third Avenue New York, NY 0022 United States of America Telephone: +22 909

More information

Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897

Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897 THOMAS B. HEFFELFINGER RESUME Personal Office: Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897 Education

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Educa&onal Event Spring 2015. Cyber Security - Implications for Records Managers Art Ehuan

Educa&onal Event Spring 2015. Cyber Security - Implications for Records Managers Art Ehuan Educa&onal Event Spring 2015 Cyber Security - Implications for Records Managers Art Ehuan Risk to Corporate Information The protection of mission dependent intellectual property, or proprietary data critical

More information

Anatomy of a Hotel Breach

Anatomy of a Hotel Breach Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent

More information

Mary H. Spillane Member. Mary H. Spillane

Mary H. Spillane Member. Mary H. Spillane Mary H. Spillane Two Union Square 601 Union Street, Suite 4100 Seattle, Washington 98101 Office: (206) 628-6656 Fax: (206) 628-6611 Email: mspillane@williamskastner.com Mary Spillane, a member in the Seattle

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

How To Help Your Business With Data Security And Privacy

How To Help Your Business With Data Security And Privacy DATA SECURITY AND PRIVACY WORKING TOGETHER, OUR TEAM PROVIDES INSIGHTFUL COUNSEL AND A DEPTH OF SPECIALIZED EXPERIENCE. Overview: S ince well before companies entered the age of Big Data, Benesch attorneys

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

Roberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J.

Roberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J. Presenting a live 90 minute webinar with interactive Q&A Data Privacy and Cybersecurity Due Diligence in M&A Deals Identifying Vulnerabilities, Drafting Data Related Provisions in M&A Agreements, Post

More information

Michele Borens, Partner

Michele Borens, Partner , Partner 700 Sixth Street, NW Suite 700 Washington, DC 20001-3980 Office: 202.383.0936 michele.borens@sutherland.com Michele Borens is both a certified public accountant and a tax attorney. She advises

More information

Perspectives on Cybersecurity and Its Legal Implications

Perspectives on Cybersecurity and Its Legal Implications Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Patrick J. Egan Partner

Patrick J. Egan Partner Patrick J. Egan Partner Philadelphia, PA Tel: 215.299.2825 Fax: 215.299.2150 pegan@foxrothschild.com Patrick is a former co-chair of the firm's White Collar Compliance & Defense Practice. He has more than

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

Answering your cybersecurity questions The need for continued action

Answering your cybersecurity questions The need for continued action www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:

More information

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016 The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,

More information

CYBER READINESS FOR FINANCIAL INSTITUTIONS

CYBER READINESS FOR FINANCIAL INSTITUTIONS CYBER READINESS FOR FINANCIAL INSTITUTIONS Are You Prepared for Your Eventual Cyber Breach? April 15, 2015 Section one STRENGTHENING CYBER RISK MANAGEMENT Earl Crane, PhD, CISSP ecrane@promontory.com www.linkedin.com/in/earlcrane

More information

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing

More information

Kenneth Herzinger. SEC and Regulatory Experience

Kenneth Herzinger. SEC and Regulatory Experience Kenneth Herzinger Partner, Securities Litigation San Francisco (415) 773-5409 kherzinger@orrick.com Related Practice Areas SEC Investigations and Enforcement Actions Accountants' Liability Securities Class

More information

Bring Your Own Device Security and Privacy Legal Risks

Bring Your Own Device Security and Privacy Legal Risks Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,

More information

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015 Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery

More information

Regulatory and Enforcement Actions Arising from Fiduciary Relationships Jim McLoughlin and John Fagg Moore & Van Allen (Charlotte, NC)

Regulatory and Enforcement Actions Arising from Fiduciary Relationships Jim McLoughlin and John Fagg Moore & Van Allen (Charlotte, NC) Regulatory and Enforcement Actions Arising from Fiduciary Relationships Jim McLoughlin and John Fagg Moore & Van Allen (Charlotte, NC) jimmcloughlin@mvalaw.com / johnfagg@mvalaw.com 704.331.1054 / 3622

More information

Catherine C. Gryczan

Catherine C. Gryczan Catherine C. Gryczan Partner catherine.gryczan@faegrebd.com Contact Numbers T: +1 312 356 5098 F: +1 312 212 6501 311 S. Wacker Drive, Suite 4300 Chicago, Illinois 60606 Governance Emerging Companies &

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

ALI-ABA Federal Sentencing Update After Kimbrough vs. The U. S. Presented in cooperation with CLE Options June 13, 2008 Live Video Webcast

ALI-ABA Federal Sentencing Update After Kimbrough vs. The U. S. Presented in cooperation with CLE Options June 13, 2008 Live Video Webcast ALI-ABA Federal Sentencing Update After Kimbrough vs. The U. S. Presented in cooperation with CLE Options June 13, 2008 Live Video Webcast FACULTY PARTICIPANTS TABLE OF CONTENTS Page ix STUDY MATERIALS

More information

Mr. Mackintosh, OFAC and the Iranian Financial Market

Mr. Mackintosh, OFAC and the Iranian Financial Market J. TRIPLETT MACKINTOSH Holland & Hart LLP 555 17th St., Suite 3200 Denver, Colorado 80202 (303) 295-8186 Legal Partner, Holland & Hart, Denver, Colorado October 2000 to present Mr. Mackintosh enjoys a

More information

Adopting a Cybersecurity Framework for Governance and Risk Management

Adopting a Cybersecurity Framework for Governance and Risk Management The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Julie A. Totten. Some of Julie s more notable engagements include the following:

Julie A. Totten. Some of Julie s more notable engagements include the following: Partner, Employment Law Sacramento (916) 329-4908 jatotten@orrick.com Julie Totten is the partner in charge of Orrick s Sacramento Office. She is also the partner in charge of the Sacramento Employment

More information

MAIN BIO EXPERIENCE SPEECHES PUBLICATIONS NEWS

MAIN BIO EXPERIENCE SPEECHES PUBLICATIONS NEWS CONTACT INFORMATION mjschmitt@michaelbest.com T 312.596.5828 F 312.222.0818 vcard Chicago Two Prudential Plaza, 180 North Stetson Avenue Suite 2000 60601 LEGAL ASSISTANT Lois T. Spurlock T 312.222.0800

More information