James A. Harvey. Partner
|
|
- Jessie Fox
- 8 years ago
- Views:
Transcription
1 James A. Harvey Partner Jim is a partner in the Technology, Privacy & IP Transactions Group and co-chairs the firm s Privacy & Security task force. His practice leverages both his experience in board level technology and outsourcing projects and his experience in sophisticated privacy, security and network intrusion issues. James A. Harvey Alston & Bird LLP One Atlantic Center 1201 West Peachtree Street Atlanta, GA jim.harvey@alston.com Services Intellectual Property IP and Technology Transactions Global Business Strategies Global Sourcing Health Information Technology HIT Task Force Investigations - Government and Special Payment Systems Privacy and Security Technology Technology and the Internet Alston & Bird Global Privacy and Security Network (ABPSN) Education University of North Carolina (J.D., 1988) University of Arkansas (B.A., 1983) Admitted to Practice Georgia Jim has worked on numerous transformative technology initiatives, including a range of IT, BPO, HR, F&A, facilities management, ERP, cloud, ecommerce/online, open source and social media engagements. Privacy and security are central issues in nearly every technology and data centric initiative in Jim s practice. Accordingly, he has worked extensively with clients on privacy and security issues and initiatives for a number of years, including having founded the firm s privacy task force in 1998, which was the same year he wrote one of the first U.S. articles on the EU Data Directive. This includes extensive work on behalf of financial services, health care, telecommunications and other regulated companies, retailers, online advertising issues and international data transfer issues. His practice also involves security breach management and response, including everything from notification of the affected individuals, to e- discovery and internal investigations and law enforcement issues. Jim worked with a number of partners to form the firm s Security Incident Management and Response Team, a unique team devoted to cyber and security crisis management and response. Representative Experience Privacy and Data Security: Represented a leading payment processing company in all phases of unauthorized intrusion into their network and all associated third party actions and proceedings. Assisting an international retailer in a comprehensive overhaul of its privacy, security, PCI and data management practices, while counseling the company in an FTC and multiple state attorneys general investigations. Advising one of the world s largest interactive marketing providers in an international criminal network intrusion involving records of more than 60 million individuals worldwide. Advising one of the world's largest Internet and concerns on its implementation of safe harbor compliance obligations with its worldwide network of edge network providers.
2 Assisting one of the world's largest investment banks in its implementation of the Red Flag Rules. Advising a major retailer in a breach involving more than 1 million names and social security numbers in all fifty states. Assisting an offshore multinational bank and financial services entity on its data gathering, use and transfer compliance program spanning 10 jurisdictions and three continents, including the EU. Assisting one of the world s largest private companies in design, development and compliance initiatives for a consolidated data base of employee information for more than 700 subsidiary companies in more than 20 countries. Sourcing/Technology Multiple comprehensive outsourcings and renegotiations of IT and processing infrastructure on behalf of Fortune 100/500 members, spanning multiple source and destination jurisdictions and continents. Representation of a UK private equity investment group in the acquisition of a U.S.-based outsourcing provider in the health care space and subsequent move of substantially the entire service delivery infrastructure offshore. Representation of one of the world's largest hybrid public-private banking concerns in the integration and license of a comprehensive Enterprise Resource Planning system involving operations in at least 23 countries. Representation of one of the world's largest money managers in the "transfer" portion of a Build/Operate/Transfer transaction, addressing tax, benefits, intellectual property and other issues arising in moving approximately 500 FTEs from a niche provider's facilities in a Software Technology Park in India to a newly created Special Economic Zone. Unique BPO transaction on behalf of a Fortune 200 insurer, sourcing novel and core aspects of regulated activities to an Indian service provider. Representation of a state agency in its acquisition of development and fiscal agent services in a Medicare/Medicaid implementation processing approximately $12 billion per year in health care related payments. Multiple comprehensive and single-process HR transactions,
3 including one transaction involving 43 client jurisdictions and two of the largest five HR transactions during 2009 and Multiple applications development and maintenance and business process transactions, including finance and administration, transaction processing, procurement and customer care transactions (onshore, offshore and near-shore, including jurisdictions as diverse as Canada, Ireland, Ghana, Guatemala, India, Philippines, Vietnam, China, Rumania and Poland). Memberships Recognized for a number of years as one of America's Leading Lawyers for information technology matters. Recognized for a number of years as one of America's leading lawyers in business process outsourcing by Chambers USA. Active participant in the Free Software Foundation's efforts to develop version 3.0 of the General Public License. Current vice chair and former chair of the Technology Section of the State Bar of Georgia Member of the Intellectual Property Section Recognized as one of Georgia s Super Lawyers for a number of years Recognized as one of Georgia s Best Lawyers Selected as an IP Star by Managing IP for 2013 Member, Phi Beta Kappa Member, Board of Trustees, Atlanta International School
4 Todd S. McClelland Partner Todd is a member of Alston & Bird's Security Incident Management and Response Team, advising clients in connection with incident response and other information security-related issues. Todd has particular experience with PCI/payment system compliance, HIPAA-related incidents, critical infrastructure security, global privacy compliance, risk assessments, and IP theft. Todd also represents clients in connection with outsourcing transactions, IP licensing and audits, and cloud transactions. Todd S. McClelland Alston & Bird LLP One Atlantic Center 1201 West Peachtree Street Atlanta, GA todd.mcclelland@alston.com Services Security Incident Management and Response Sourcing & Complex Procurement Intellectual Property IP & Technology Transactions Mechanical Patents Digital Commerce & the Internet Privacy & Security Alston & Bird Global Privacy and Security Network (ABPSN) Government Contracts Education Florida State University (J.D., 1998) Georgia Institute of Technology (B.ME, 1994) Admitted to Practice U.S. Patent and Trademark Office Georgia District of Columbia Todd is a frequent speaker at professional seminars (including the CISO Executive Network) and author of articles on topics such as cybersecurity, active defense, security incidents, global data privacy compliance, smart grid, cloud computing, and IP protection. Todd is featured in Chambers USA for his outsourcing practice. He is a past chair of the IP Section of the State Bar of Georgia. Todd received his J.D. in 1998 from Florida State University where he was a member of the Law Review and was the executive editor of the Journal of Land Use and Environmental Law. He received a B.S. in mechanical engineering, with high honors, in 1994 from the Georgia Institute of Technology (Georgia Tech). Prior to law school, Todd worked as an engineer designing automation systems for companies such as Coca-Cola and the Ford Motor Company. Representative Experience Advising entities (hospitals, payment processors, retailers, financial institutions, and others) in connection with data security incidents, both in response to incidents and proactive preparation. Advising a global hospitality company on its data security strategy and incident response. Representing a power distribution concern in a state-wide comprehensive smart grid initiative. Advising a top tier pharmaceutical company in connection with the outsourcing of its IT environment and its global privacy compliance. Representing a global transportation company in outsourcing
5 components of its IT platform, international F&A functions, ADM functions, and other business functions. Advising an international payments processing company in the outsourcing of core IT functions. Representing one of the largest big-box home improvement stores in the outsourcing of infrastructure management services. Representing a large independent power producer in connection with the sourcing of multiple HR and IT processes. Recent Publications and Events Innovative Smart Grid Projects (November 7, 2012 Seminar). CISO Executive Network: Application and Third Party Security (October 2012 Seminar). CISO Executive Network: Information Lifecycle Management (September 2012 Seminar). CISO Executive Network: Endpoint Security Management Including Mobile Devices (June 2012 Seminar). CISO Executive Network: Virtualization and Cloud Computing Security (May 2012 Seminar). CISO Executive Network: Security Operations with a Special Focus on Event and Log Management (March 2012 Seminar). CISO Executive Network: Identity Management and Access Control (February 2012 Seminar). UCLA Anderson IS Associates Fall Meeting: The Cloud Through a Legal Lens (November 9, 2011 Seminar). Exploring the Outsourcing Implications of India s Recently Released Privacy Rules, Outsourcing and Privacy & Security Advisory, June 21, Cloud Computing: Watch Out For the Lightning! (March 30, 2010 Seminar). What Else Should Keep You Up at Night Trends in Data Security and Behavioral Marketing (September 17, 2009 Seminar). Memberships State Bar of Georgia
6 U.S. Patent and Trademark Office Founding member of the Atlanta chapter of the Cloud Security Alliance International Association of Privacy Professionals (IAPP) CISO Executive Network
7 Kimberly Kiefer Peretti Partner Kimberly Kiefer Peretti Alston & Bird LLP 950 F Street, NW Washington, DC kimberly.peretti@alston.com Services Privacy & Data Security Security Incident Management & Response Team Litigation Foreign Corrupt Practices Act (FCPA) Violations Government & Internal Investigations Payment Systems Education University of Munich, Germany (LL.M., 1997) Master's Thesis: Conflicts of interests of institutional investors in German stock corporations Georgetown University (J.D., 1996) Journal: Law & Policy in International Business, Magna cum laude University of Wisconsin (B.A., 1992) Major: Behavioral Science and Law, Phi beta kappa Admitted to Practice District of Columbia Illinois Kimberly (Kim) Kiefer Peretti is a partner in the firm s White Collar Crime Group and co-chair of our Security Incident Management and Response Team. Ms. Peretti is also a former director of PricewaterhouseCoopers cyber forensic service practice and a former senior litigator for the Department of Justice's Computer Crime and Intellectual Property Section. She focuses her practice on managing complex, technical electronic investigations and responses, often resulting from cyber intrusions and data breaches. She also services a wide range of clients in matters of cybersecurity; privacy; financial crime, fraud and regulation; payment systems compliance and risk mitigation; economic espionage; and intellectual property theft. While at the Department of Justice, Kim led several benchmark cybercrime investigations and prosecutions, including the prosecution of the infamous TJX hacker Albert Gonzalez, currently serving 20 years in prison for his role in the largest hacking and identity theft case ever prosecuted by the department. Kim is regularly quoted in the media and is a frequent keynote speaker and lecturer. She was featured in both a New York Times Magazine cover story and a CNBC documentary for her role in the prosecution of Gonzalez, appeared on MSNBC s Up with Chris Hayes, and has been recognized as an information security "industry pioneer" by SC Magazine. Top Secret clearance and SCI access (eligible). Representative Experience Represented a global payment processor in connection with a technical, complex computer crime investigation involving a sophisticated cyber threat actor. The crisis response effort included advising on a myriad of legal issues including securities law guidance, regulatory issues, class action defense governmental investigations, insurance coverage and issues. The effort also included supervising and managing a complex cyber forensic investigation that included a rapid response to a sophisticated intruder with deep and persistent access to the environment, development of containment, eradication, and remediation strategies, and coordination of the activities of multiple third parties including an independent forensic investigator,
8 Languages German several payment card brand networks, financial regulators and federal law enforcement. Represented one of the world s largest interactive marketing services providers in a massive network breach, involving more than 60 million individual records. Worked with a global energy company suspected of being compromised by Advanced Persistent Threat actors. The response including enhanced monitoring of critical systems, preventative forensics including a breach indicator assessment, a review of existing investigation and law enforcement information, and assisting management with briefings to executives. Representative Cyber Law and Cyber Security Worked with a global transportation company in developing cybersecurity policies and strategies. The project included ongoing monitoring of federal government initiatives with respect to critical infrastructure cybersecurity and development of appropriate responses, policies, and procedures related to cyber intelligence gathering, information sharing, and cybersecurity practices. Extensive work with a range of Fortune 250 companies on securities disclosure issues arising from cyber risks. These engagements included companies with particular cyber risks and those that have suffered network intrusions and then have to deal with related securities reporting issues. Consulting with a number of domestic and international banks on their response to and preparation for recent, highly-sophisticated and suspected state-sponsored DDoS attacks on their networks. Worked with an international monetary organization in connection with a multi-phased, comprehensive information security risk assessment based on the global information security standard ISO Our involvement included leading a threat-modeling workshop to assist the company in understanding the client s current threats and defenses and identify any known gaps in the information security infrastructure in particular with respect to sophisticated attacks, such as Advanced Persistent Threat. Worked with a multi-services organization in connection with a multiphased, enterprise security risk assessment in which we led an incident response workshop and cyber tabletop exercises to identify any known weaknesses in incident response process and procedures, in particular with scenarios related to sophisticated cyber attacks and intrusions.
9 Worked with a large global consulting firm in an assessment of the company s practices, controls, policies, and procedures with respect to the ease with which sensitive client data and company confidential data could leave the company s systems, whether by an inadvertent act by an employee or a malicious act by an insider or an outsider. Representative Privacy-related Regulatory Inquiry Represented a number of clients in relation to federal and state regulatory inquires involving Internet-based practices potentially violating federal and state unfair and deceptive trade practices acts, including a large online advertising company s practices with respect to the use of third party cookies, a mobile phone carrier s practices with respect to a user s browser s experience, and an automotive dealership s practices with respect to collecting user information and monitoring user behavior online. Memberships United States Supreme Court o o o United States Court of Appeals for the Ninth Circuit United States Court of Appeals for the District of Columbia Circuit United States District Court for the District of Columbia Certified Information Systems Security Professional (CISSP) ABA, Section of Science and Technology Law and Litigation Section Selected Publications "Evolving DDoS Attacks Provide the Driver for Financial Institutions to Enhance Response Capabilities," The Banking Law Journal, June Challenges in Conducting Breach Investigations: Part 2, Law360, April "Challenges in Conducting Breach Investigations: Part 1," Law360, March 25, Compliance with Payment Card Industry Data Security Standard, Proskauer on Privacy: A Guide to Privacy and Data Security Law in the Information Age, Practising Law Institute, February 2011 (co-author of chapter). Data Breach and Encryption Handbook, ABA Publishing, February 2011 (contributor).
10 Data Breaches: What the Underground World of Carding Reveals, Santa Clara Computer and High Technology Journal, Vol. 25, January 2009 (author) (this article resulted in a hearing before the U.S. House of Representatives Homeland Security Committee to consider vulnerabilities in the payment card industry). Prosecuting Computer Crimes, U.S. Department of Justice, February 2007 (contributor). Recent Speeches Presenter, "Women in Cyber Security, Why Women Don't Ask: The Challenges of Promotion and Is In-House Counsel 'Women's Work?'" Georgetown Women s Law Forum, June Presenter, The Cybersecurity Risks to Business, Governments and Individuals, Practising Law Institute s Seminar, Information Technology Law Institute 2013: Privacy and Cybersecurity, Mobile Advertising, Digital Distribution, Social Media and Third Industrial Revolution, April Presenter, The Cyber Threat Landscape: New Themes in Prevention, Detection and Response, RSA Conference 2013, February Presenter, Digital Forensics: Civil vs. Criminal, Fourth Annual Electronic Discovery and Digital Evidence (EDDE) Practitioner s Workshop, January Panelist, Senior Executive Panel: The Faces of Courage in Women's Leadership, Working Mother Media's Leadership Summit for Women in National Security Careers, May Presenter, Computer Hacking The Threat to Personal and Business Security, PLI's Information Technology Law Institute 2012, April Keynote, Cyber Criminals: Who are they? Why are they successful? How do we respond?, University of Michigan Information Security Conference, October 2011.
Solo Practitioner Beverly Hills, California 1989-1998
NINA MARINO 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90212 Tel: (310) 557-0007 marino@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino, PC Beverly Hills, California 1998-present Solo
More informationWalter F. Brown Jr. Profile. Practices. Education. Honors. Partner White Collar, Investigations, Securities Litigation & Compliance.
Partner White Collar, Investigations, Securities Litigation & Compliance San Francisco (415) 773-5995 Profile Walter F. Brown, Jr., a partner in the San Francisco office, is a seasoned trial lawyer and
More informationPresident of the Virginia State Bar June 2013-June 2014. Member of the Executive Committee of the Virginia State Bar and its governing Council
PROFESSIONAL EXPERIENCE Sharon D. Nelson, Esq. President Sensei Enterprises, Inc. 3975 University Dr., Suite 225 Fairfax, VA. 22030 703-359-0700 (Phone) 703-359-8434 (Fax) snelson@senseient.com (e-mail)
More informationKENNETH A. ADLER Partner and Chair, Technology and Outsourcing Practice Group
Partner and Chair, Technology and Outsourcing Practice Group 345 Park Avenue New York, New York 10154 Direct 212.407.4284 Fax 212.202.6039 kadler@loeb.com Kenneth Adler specializes in complex global and
More informationKENNETH A. ADLER Partner and Chair, Technology and Outsourcing
Partner and Chair, Technology and Outsourcing 345 Park Avenue New York, New York 10154 Direct 212.407.4284 Fax 212.202.6039 kadler@loeb.com Kenneth Adler specializes in complex global and domestic outsourcing
More informationwww.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
More informationHow To Defend A Company In A Securities Fraud Case
Thomas O. Gorman Porter Wright Morris and Arthur tgorman@porterwright.com Tel: 202-778-3004 Fax: 202-778-3063 1919 Pennsylvania Avenue, N.W., Suite 500 Washington, D.C. 20006-3434 Career Highlights Mr.
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationMichelle Peirce PRACTICE AREA: LITIGATION
PRACTICE AREA: LITIGATION Michelle R. Peirce is Co-Chair of the firm s Litigation practice, devoting her time equally to complex civil litigation and white-collar criminal defense. She is a past president
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationPresident of the Virginia State Bar June 2013-June 2014. President of the Fairfax Law Foundation July 2014-July 2015. Board Member 2002-present.
PROFESSIONAL EXPERIENCE Sharon D. Nelson, Esq. President Sensei Enterprises, Inc. 3975 University Dr., Suite 225 Fairfax, VA. 22030 703-359-0700 (Phone) 703-359-8434 (Fax) snelson@senseient.com (e-mail)
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationSpecial Report The HITECH Act
Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known
More informationCynthia E. Jones. David A. Clark School of Law, University of the District of Columbia Summer 1996 Adjunct Instructor (Appellate Advocacy)
Cynthia E. Jones Teaching Experience Assistant Professor of Law Fall 2004-present Visiting Professor 2002-2004 Courses: Evidence, Criminal Law, Criminal Procedure and Race, Crime and Politics seminar George
More information$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP
David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationDouglas M. DePeppe Cyberlaw Attorney
Douglas M. DePeppe Cyberlaw Attorney doug@aspireip.com Cyber Risk Services Cyber Space Cyber Law International Cyber Frameworks IP Litigation George Washington University Law School, LL.M. The Judge Advocate
More informationLawrence D. Finder. Practice description. Practice focus
Practice description Larry Finder has extensive experience in government investigations, corporate compliance counseling, federal grand jury, trial practice, internal investigations and business crimes.
More informationRobert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from
Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from The University of Michigan in May, 1987. In 1990, he
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationALI-ABA Audio Seminar
ALI-ABA Audio Seminar Tiffany v. ebay: Roadmap for Avoiding Liability or Short Detour for Trademark Owners? August 6, 2008 Telephone Seminar/Audio Webcast PROGRAM SCHEDULE FACULTY PARTICIPANTS FACULTY
More informationwww.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
More informationCharles A. De Monaco Partner
Charles A. De Monaco Partner Pittsburgh, PA Tel: 412.394.6929 Fax: 412.391.6984 cdemonaco@foxrothschild.com Charles concentrates his practice in securities litigation and director and officer liability,
More informationCybersecurity Opportunities. Presented to: National Professional Science Masters Association November 13, 2013
Cybersecurity Opportunities Presented to: National Professional Science Masters Association November 13, 2013 Overall Themes For Discussion Advice for Grads Your Degree Is A Place To Start. It does not
More informationunderstanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;
GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity
More informationSpecial Assistant City Attorney Prosecuted criminal violations for the City of Minneapolis, 1994
Edward B. Magarian Partner Co-Chair, White Collar Crime and Civil Fraud Dorsey & Whitney LLP Suite 1500 50 South Sixth Street Minneapolis, MN 55402-1498 (612) 340-7873 : phone (612) 340-2807 : fax magarian.edward@dorsey.com
More informationBARRY L. GROSSMAN OF COUNSEL 777 E WISCONSIN AVENUE MILWAUKEE, WI 53202-5306 (414) 297-5724 BGROSSMAN@FOLEY.COM
BARRY L. GROSSMAN Barry L. Grossman is of counsel with Foley & Lardner LLP. Mr. Grossman is a member of and past leader of the Mechanical & Electromechanical Technologies and Trademark, Copyright & Advertising
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationHow To Write A Book
THOMAS B. HEFFELFINGER RESUME Personal Education Office: Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897
More informationCybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
More informationTHOMAS B. HEFFELFINGER
THOMAS B. HEFFELFINGER RESUME Personal Education Office: Best & Flanagan LLP 60 South Sixth Street, Suite 2700 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897
More informationSTEPHEN J. COSENTINO Partner
STEPHEN J. COSENTINO Partner stephen.cosentino@stinsonleonard.com 816.691.2450 1201 Walnut Suite 2900 Kansas City, MO 64106 Steve Cosentino, an innovative leader in the information technology, software
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More informationRobert D. Piliero Representative Matters Financial Services
Butzel Long :: Lawyers & Professionals :: Robert D. Piliero Robert D. Piliero Robert D. Piliero is a shareholder practicing in Butzel Long s New York office. He graduated from the Wharton School of Finance
More informationCybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
More informationCybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues
Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues Todd Bertoson Daniel Gibb Erin Sheppard Principal Senior Managing Associate Counsel todd.bertoson@dentons.com
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationJ. D.,University of La Verne School of Law, California 1989. United States Court of Appeal,Ninth Circuit 1990
NINA MARINO 9454 Wilshire Boulevard Suite 500 Beverly Hills, California 90212 Tel: (310) 557-0007 kaplan@kaplanmarino.com EMPLOYMENT Partner, Kaplan Marino,PC Beverly Hills, California 1998-present Solo
More informationProgram. Faculty Directory
Department Telfer Going of Finance Global Canada Anti-Corruption Executive Leadership Program Program Faculty Directory Marvin Hough Telfer Executive in Residence Academic Director 30 Year Career at Export
More informationThe Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
More informationPATENT LITIGATION IN US AND GERMANY SEMINAR THOMSON REUTERS, LEGAL CORDIALLY INVITES YOU TO
THOMSON REUTERS, LEGAL CORDIALLY INVITES YOU TO PATENT LITIGATION IN US AND GERMANY SEMINAR There are still significant differences within the three major business centers of China, USA and Europe on patent
More informationFreelance Lawyers. The industry's best kept secret. Christopher Kozlowski
Freelance Lawyers The industry's best kept secret. Christopher Kozlowski About Me Co-founder and partner of Streamline Litigation, which I started while I was still in law school at Villanova University
More informationEmail Data Security. The dominant business communication tool
Email Data Security Jim Brashear General Counsel Zix Corporation Dallas Business Uses Email The dominant business communication tool Time spent on email exceeds time spent on all other communication tools
More informationData Privacy and Cybersecurity Task Force
Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,
More informationKAREN KINCAID BALMER, CPA, CFF, CFE, CrFA
KAREN KINCAID BALMER, CPA, CFF, CFE, CrFA Forensic Accounting and Litigation Services Contact Information: 917-301-5897 320 East 46 th Street 5G, New York, NY 10017 karenbalmer@kcfacpa.com As a Certified
More informationCyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day
Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014
More informationAnatomy of a Privacy and Data Breach
Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions
More informationBernice P. (Bernie) Dixon
Bernice P. (Bernie) Dixon Bernice P. Dixon is the Chairman and CEO of Atlanta Technology Angels and Founder and CEO of Advising Angels. Bernie has been passionate about leveraging her positions as a senior
More informationCYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
More informationPROFESSIONAL EXPERIENCE:
ROBERT R. KUEHN Washington University School of Law Campus Box 1120 One Brookings Drive St. Louis, MO 63130-4899 phone (314) 935-5706 fax (314) 935-5356 rkuehn@wulaw.wustl.edu PROFESSIONAL EXPERIENCE:
More informationaug 15 Tax PRacTice GROUP
aug 15 Tax PRacTice GROUP OUR Tax Practice Pestalozzi s Tax practice group advises clients in Switzerland and abroad on the complete range of domestic and international tax laws. We are a business law
More informationWho s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationCURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law
CURRICULUM VITAE BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com PROFESSIONAL POSITIONS: Partner, Kostelanetz & Fink, LLP 7 World Trade Center New York, New York 10007 Adjunct Professor, Taxation
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationSills Cummis & Gross P.C.
JACK WENIK member of the firm co-chair of the health care government investigations practice group SPECIALTY: AREAS OF EMPHASIS Health Care Fraud Internal Investigations Doctor Disciplinary Proceedings
More informationIntellectual Property Attorneys LLP
Intellectual Property Attorneys LLP Price Heneveld LLP is an internationally recognized law partnership specializing in all areas of intellectual property patent, trademark, and copyright causes, technology-related
More informationEnCase Enterprise For Corporations
TM GUIDANCE SOFTWARE EnCASE ENTERPRISE EnCase Enterprise For Corporations An Enterprise Software Platform Allowing Complete Visibility Across your Network for Internal Investigations, Network Security,
More informationNIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
More informationDelaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP
Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats
More informationWIPO LIST OF NEUTRALS BIOGRAPHICAL DATA. Telephone: +1212 909 6696 Fax: +1212 521 7696 E-mail: dhbernstein@debevoise.com
ARBITRATION AND MEDIATION CENTER WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA David H. BERNSTEIN Partner Debevoise & Plimpton LLP 99 Third Avenue New York, NY 0022 United States of America Telephone: +22 909
More informationBest & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897
THOMAS B. HEFFELFINGER RESUME Personal Office: Best & Flanagan LLP 225 South Sixth Street, Suite 4000 Minneapolis, Minnesota 55402-4690 Office Telephone: (612) 339-7121 Office Fax: (612) 339-5897 Education
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationEduca&onal Event Spring 2015. Cyber Security - Implications for Records Managers Art Ehuan
Educa&onal Event Spring 2015 Cyber Security - Implications for Records Managers Art Ehuan Risk to Corporate Information The protection of mission dependent intellectual property, or proprietary data critical
More informationAnatomy of a Hotel Breach
Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent
More informationMary H. Spillane Member. Mary H. Spillane
Mary H. Spillane Two Union Square 601 Union Street, Suite 4100 Seattle, Washington 98101 Office: (206) 628-6656 Fax: (206) 628-6611 Email: mspillane@williamskastner.com Mary Spillane, a member in the Seattle
More informationImpact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
More informationHow To Help Your Business With Data Security And Privacy
DATA SECURITY AND PRIVACY WORKING TOGETHER, OUR TEAM PROVIDES INSIGHTFUL COUNSEL AND A DEPTH OF SPECIALIZED EXPERIENCE. Overview: S ince well before companies entered the age of Big Data, Benesch attorneys
More informationThe Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor
The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on
More informationRoberta D. Anderson, Partner, K&L Gates, Pittsburgh. Alan Brill, Senior Managing Director, Kroll, Secaucus, N.J.
Presenting a live 90 minute webinar with interactive Q&A Data Privacy and Cybersecurity Due Diligence in M&A Deals Identifying Vulnerabilities, Drafting Data Related Provisions in M&A Agreements, Post
More informationMichele Borens, Partner
, Partner 700 Sixth Street, NW Suite 700 Washington, DC 20001-3980 Office: 202.383.0936 michele.borens@sutherland.com Michele Borens is both a certified public accountant and a tax attorney. She advises
More informationPerspectives on Cybersecurity and Its Legal Implications
Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationPatrick J. Egan Partner
Patrick J. Egan Partner Philadelphia, PA Tel: 215.299.2825 Fax: 215.299.2150 pegan@foxrothschild.com Patrick is a former co-chair of the firm's White Collar Compliance & Defense Practice. He has more than
More informationExecutive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationNine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity
Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers
More information12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
More informationAnswering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
More informationThe Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationCYBER READINESS FOR FINANCIAL INSTITUTIONS
CYBER READINESS FOR FINANCIAL INSTITUTIONS Are You Prepared for Your Eventual Cyber Breach? April 15, 2015 Section one STRENGTHENING CYBER RISK MANAGEMENT Earl Crane, PhD, CISSP ecrane@promontory.com www.linkedin.com/in/earlcrane
More informationGLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing
More informationKenneth Herzinger. SEC and Regulatory Experience
Kenneth Herzinger Partner, Securities Litigation San Francisco (415) 773-5409 kherzinger@orrick.com Related Practice Areas SEC Investigations and Enforcement Actions Accountants' Liability Securities Class
More informationBring Your Own Device Security and Privacy Legal Risks
Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,
More informationInsulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015
Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery
More informationRegulatory and Enforcement Actions Arising from Fiduciary Relationships Jim McLoughlin and John Fagg Moore & Van Allen (Charlotte, NC)
Regulatory and Enforcement Actions Arising from Fiduciary Relationships Jim McLoughlin and John Fagg Moore & Van Allen (Charlotte, NC) jimmcloughlin@mvalaw.com / johnfagg@mvalaw.com 704.331.1054 / 3622
More informationCatherine C. Gryczan
Catherine C. Gryczan Partner catherine.gryczan@faegrebd.com Contact Numbers T: +1 312 356 5098 F: +1 312 212 6501 311 S. Wacker Drive, Suite 4300 Chicago, Illinois 60606 Governance Emerging Companies &
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationALI-ABA Federal Sentencing Update After Kimbrough vs. The U. S. Presented in cooperation with CLE Options June 13, 2008 Live Video Webcast
ALI-ABA Federal Sentencing Update After Kimbrough vs. The U. S. Presented in cooperation with CLE Options June 13, 2008 Live Video Webcast FACULTY PARTICIPANTS TABLE OF CONTENTS Page ix STUDY MATERIALS
More informationMr. Mackintosh, OFAC and the Iranian Financial Market
J. TRIPLETT MACKINTOSH Holland & Hart LLP 555 17th St., Suite 3200 Denver, Colorado 80202 (303) 295-8186 Legal Partner, Holland & Hart, Denver, Colorado October 2000 to present Mr. Mackintosh enjoys a
More informationAdopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationJulie A. Totten. Some of Julie s more notable engagements include the following:
Partner, Employment Law Sacramento (916) 329-4908 jatotten@orrick.com Julie Totten is the partner in charge of Orrick s Sacramento Office. She is also the partner in charge of the Sacramento Employment
More informationMAIN BIO EXPERIENCE SPEECHES PUBLICATIONS NEWS
CONTACT INFORMATION mjschmitt@michaelbest.com T 312.596.5828 F 312.222.0818 vcard Chicago Two Prudential Plaza, 180 North Stetson Avenue Suite 2000 60601 LEGAL ASSISTANT Lois T. Spurlock T 312.222.0800
More information