Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Size: px
Start display at page:

Download "Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down"

Transcription

1 Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification & Investigation Notification Issues, Internal & External Incident Response Strategies Working with Clients, the Government Wednesday, May 29, :00 a.m. 12:30 p.m. The Yale Club 50 Vanderbilt Avenue New York City Sponsor:

2 Law Firms: Highly Vulnerable Targets Revising Your Strategy to be Prepared and Responsive, Acting Decisively and Promptly Add to the top of your risk list: data thieves. Increasingly, hackers and intruders, both internal and external, have realized that law firms may be the soft underbelly of the system. Therein lies opportunity for the criminally inclined and a complicated set of new challenges for those charged with dealing with clients and protecting their firms sensitive information. Cyber Security is not just an IT issue anymore. It requires the attention of senior legal leadership and business executives and, also, early interdiction by the team to protect clients, employees, partners, third parties, and the firm. This update is the first to address these issues from the top down. We have specifically tailored the agenda to analyze particular, often unique, issues law firms must face including: The business model of a law firm is based on leveraging the work product from old matters to new situations. This open access and sharing are a potential information security weakness. They run counter to sound information practices. How do you respond to this challenge? What is the best governance structure to deal with cyber security incidents and response? Notification issues/strategies (47 states have breach notification laws) What is the appropriate trigger for notifying a client, all clients, one or more partners, third parties, and law enforcement? What should be the mechanism for notification? What strategy should you pursue for dealing with the increasing number of client security provisions built into fee arrangements? Should you work with a security company to investigate, assess, and suggest solutions? What do the lawyer leaders at the firm need to know about a breach or hack? Case Studies: A strengthening market means firms are seeing transactions and mergers in greater number and size and receiving more company data. How do cyber intrusion threats affect due diligence, negotiations, contract terms, etc.? In the financial services sector, which has expressed concerns about law firms being the weak link in the security chain, how should you deal with client security requests and potential legal liability questions? Firms increasingly are receiving lengthy questionnaires about firm IT practices and asked for certifications on policies and protocols. How should you respond to these audits? Who Should Attend? Chairman, Managing Partners, Executive Committee Members, Partner Heads of Technology Committee, Risk Committee, IP, Litigation Practice Group Leaders, COO, Executive Directors, CTO, CIO, General Counsel

3 FROM THE GOVERNMENT: Judith H. Germano, Chief, Economic Crimes Unit, Assistant U.S. Attorney, U.S. Attorney s Office, District of New Jersey, Department of Justice, Newark, NJ PANELISTS: Andreas M. Antoniou, Chief Information Officer, Paul, Weiss, Rifkind, Wharton & Garrison, NYC Mitchell J. Auslander, Partner, Chairman of Risk Committee, Willkie Farr & Gallagher, NYC Lawrence J. Bracken II, Partner, Hunton & Williams, Atlanta Bob Bratt, Chief Operating Officer and Executive Director, U.S. Operations, DLA Piper, Washington D.C. Dave Canfield, Managing Director Client Solutions, UnitedLex, NYC James A. Harvey, Partner, Head of Technology, Privacy & IP Transactions Group, Alston & Bird, Washington D.C. Don Jaycox, Chief Information Officer, Americas, DLA Piper, San Diego Stuart D. Levi, Partner, Chairman of Technology Committee, Skadden, NYC Alan Charles Raul, Partner, Sidley Austin, Washington D.C. William Wynne, Jr., Partner, Chairman of Risk Management Committee, White & Case, NYC PROGRAM HIGHLIGHTS: 8:30 9:00 a.m. Breakfast & Registration; 9:00 a.m. 12:30 p.m. Program A. Defining Cyber Crime in the Law Firm Context: Data Breaches, Hacking, Trade Secrets B. Who and What Types of Threats Are Most Significant The View from the U.S. Attorney s Office 1. How to separate the serious threats from the mere annoyances 2. Threats externally and within your organization 3. Economic espionage 4. State sponsored attacks C. Firm Governance: To what extent should law firm leadership be involved/informed of cyber risk? Cyber security incident response? D. What is an effective strategy for dealing with the increasing number of client security provisions and questionnaires built into contractual requirements? E. Incident Response Strategies 1. Notification Issues/Strategies: What is the trigger for notifying a client of a security incident? All clients? One or more partners? Law enforcement? What is the notification mechanism? 2. What does a successful response to a cyber attack look like? 3. Who is included in responding; who is on the team internally; how long does it take? 4. How do you determine the objective of an attack? 5. Liability Insurance F. Risk Management Oversight including Training, Outside Consultants G. Working with Clients 1. Strategies for protecting sensitive data 2. How to curtail losses clients might suffer 3. As the deal market strengthens with greater number and size of transactions firms have more company data. How does a cyber intrusion affect due diligence, negotiations, contracts 4. Law firm as third party; Policies, protocols, assessments, certifications, and questionnaires H. Working with the Government 1. At what point do you involve the Government? 2. Lessons to be learned and information sharing I. Intellectual Property Issues 1. Data protection 2. Privacy considerations with clients, firm partners and staff 3. Cyber Security Concerns 4. Special issues including Bring Your Own Device (BYOD). Firm Policies and Protocols J. Ethical Issues

4 LAW FIRM CYBER RISK CONFERENCE Wednesday, May 29, 2013, New York; 9:00 a.m. 12:30 p.m. The Yale Club of New York, 50 Vanderbilt Avenue, New York TO REGISTER: E MAIL HULisaColombo@sandpiperpartners.comUH, PHONE , or FAX or MAIL Sandpiper Partners LLC, 855 Valley Road, Suite 209, Clifton, NJ Name: Position: Firm: Address: City: State: Zip: Phone: **REGISTER VIA E MAIL & SAVE $50 OFF REGISTRATION PRICE** Fee: $495 (includes educational meeting, materials, breakfast, coffee break). Registration fee must be paid in advance, by May 22, Method of Payment: (Please check your preferred method) Check (payable to Sandpiper Partners LLC) Credit Card: AMEX Visa MasterCard Card Number Expiration Date Billing Address Signature Cancellations: The deadline for cancellations is Wednesday, May 22, 2013, 4 p.m. ET. A refund, less an administration charge of $100, will be given. After this date, no refunds will be made. Substitutions may be made at any time. CLE credit including ethics credit has been applied for. Conference Organizer Sandpiper Partners is a consulting firm run by highly successful entrepreneurs, Lynn and Stephen Glasser, who have decades of experience producing business of law, educational events, surveys, publications and solutions for law firms. The Glassers designed and implemented the first ever Executive MBA for Law Firm Managers. Sandpiper Partners has organized and presented a series of groundbreaking conferences on cyber crime and the cyber threat landscape for the business community. HUwww.sandpiperpartners.comUHU. Sponsor If you no longer wish to receive these s, please reply to this message with "Unsubscribe" in the subject line or message body or please send a letter including your name, request for discontinuance, and address to: Sandpiper Partners LLC, 855 Valley Road, Second Floor, Clifton, NJ

5

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today! EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith

More information

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD 8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 th - 18 th June 2014 Swissotel Sydney CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered

More information

EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS

EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS Wednesday, June 25, 2014 Georgetown University Law Center Washington, DC CLE 7.0 CLE credit hours (based on a 60-minute credit hour) including 1.0 ethics

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

The 2014 IP and The. Internet Conference. The Luxe Hotel-Sunset Blvd 11461 Sunset Blvd. Thursday, June 12, 2014. applies to Legal Ethics

The 2014 IP and The. Internet Conference. The Luxe Hotel-Sunset Blvd 11461 Sunset Blvd. Thursday, June 12, 2014. applies to Legal Ethics Earn 7.25 Hours MCLE of which 1.0 Hour applies to Legal Ethics The State Bar of California Intellectual property section Presents The 2014 IP and The Internet Conference Thursday, June 12, 2014 The Luxe

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

HOME DEPOT DATA BREACH

HOME DEPOT DATA BREACH HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Minnesota State Bar Association Continuing Legal Education. Medical Devices: Law and Strategy

Minnesota State Bar Association Continuing Legal Education. Medical Devices: Law and Strategy Minnesota State Bar Association Continuing Legal Education Patent Protection for Medical Devices: Law and Strategy Learn what every patent lawyer should know about this dynamic and complex area of law,

More information

CAMP BOOT BASIC TRAINING FOR LAWYERS. Get the Skills You Need. to Successfully Compete in Today s Challenging Market REGISTER

CAMP BOOT BASIC TRAINING FOR LAWYERS. Get the Skills You Need. to Successfully Compete in Today s Challenging Market REGISTER BOOT BASIC TRAINING FOR LAWYERS CAMP Get the Skills You Need 13 to Successfully Compete in Today s Challenging Market Presented by Committee on Career Advancement and Management and Committee on Law Student

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

The Home Depot Provides Update on Breach Investigation

The Home Depot Provides Update on Breach Investigation The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers

More information

Working with the FBI

Working with the FBI Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement

More information

FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE

FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE FULLY ACCREDITED IN-CLASS PROGRAM & LIVE WEBINAR Toronto, June 9 Webinar, June 9 REGISTER BEFORE MAY 13 AND SAVE OVER $300 FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE FINANCE THREATS REGULATORY

More information

Codes of Conduct and Corporate Social Responsibility:

Codes of Conduct and Corporate Social Responsibility: NEW YORK STATE BAR ASSOCIATION Codes of Conduct and Corporate Social Responsibility: 3 r d An n u a l Co n f e r e n c e o n In t e r n at i o n a l Em p l o y m e n t La w Held at White & Case LLP 1155

More information

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every

More information

DEVELOPMENTS AND TRENDS IN HEALTHCARE LAW 2015

DEVELOPMENTS AND TRENDS IN HEALTHCARE LAW 2015 DEVELOPMENTS AND TRENDS IN HEALTHCARE LAW 2015 Co-sponsored with the Health Law Section of the Alabama State Bar September 11, 2015 Birmingham Marriott Birmingham, Alabama 6 CLE hours, including 1 hour

More information

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am 1 of 7 5/8/2014 7:34 PM Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am Editor s Note: David A. Katz is a partner at Wachtell, Lipton, Rosen & Katz specializing

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

Cyber Security: The Growing Liability of Handheld & Mobile Devices

Cyber Security: The Growing Liability of Handheld & Mobile Devices Cyber Security: The Growing Liability of Handheld & Mobile Devices 1 About Advisen: Advisen Ltd. is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial

More information

E-Discovery. A Practical Guide to

E-Discovery. A Practical Guide to Minnesota State Bar Association Continuing Legal Education Your State Bar at Work for You A Practical Guide to E-Discovery This seminar goes beyond simple summaries of the changes to the Rules of Civil

More information

AIPLA. electronics & computer patent law summit. august 16, 2011. william mitchell college of law 875 summit ave. st. paul, mn 55105. www.aipla.

AIPLA. electronics & computer patent law summit. august 16, 2011. william mitchell college of law 875 summit ave. st. paul, mn 55105. www.aipla. electronics & computer patent law summit august 16, 2011 william mitchell college of law 875 summit ave. st. paul, mn 55105 american intellectual property law association 241 18th street south, suite 700

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP

Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA, LLP Created as a collaborative effort between government and industry to ensure every American has the resources they need to stay

More information

FUNDAMENTALS OF MUNICIPAL BOND LAW SEMINAR

FUNDAMENTALS OF MUNICIPAL BOND LAW SEMINAR 2014 FUNDAMENTALS OF MUNICIPAL BOND LAW SEMINAR April 30 - May 2, 2014 Grand Hyatt Atlanta Atlanta, GA You rm Att issi e cam nd a on: th p to h r one ee day you b r sk oot ills. Are You Ready?! Do you

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know

Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know Gus Coldebella, Goodwin Procter LLP John Geschke, VP and General Counsel, Zendesk, Inc. Jim Jaeger, VP, Cybersecurity

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

MERCER COUNTY BAR ASSOCIATION XTREME CLE. 2.0 NJ CLE Credits. Charles Centinaro, Esq., Director of Attorney Ethics

MERCER COUNTY BAR ASSOCIATION XTREME CLE. 2.0 NJ CLE Credits. Charles Centinaro, Esq., Director of Attorney Ethics MERCER COUNTY BAR ASSOCIATION XTREME CLE COURSE TITLE: LOCATION: Ethics with Charles Centinaro 2.0 NJ CLE Credits The Conference Center at MCCC DATE: Wednesday, October 29, 2014 TIME: SPEAKERS: 8:00 am

More information

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Corporate Perspectives On Cybersecurity: A Survey Of Execs Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

Unprecedented Hacking and Trading Scheme Highlights Important Cybersecurity Lessons

Unprecedented Hacking and Trading Scheme Highlights Important Cybersecurity Lessons Securities Enforcement and Data, Privacy & Security Practice Groups August 21, 2015 Unprecedented Hacking and Trading Scheme Highlights Important Cybersecurity Lessons DOJ and SEC charge hackers and traders

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Managing risk associated with third-party outsourcing

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

Cyber Risks Connect With Directors and Officers

Cyber Risks Connect With Directors and Officers Cyber Risks Connect With Directors and Officers Implications of the New SEC Guidance on Cyber Security February 2012 Lockton Companies, LLC The Securities and Exchange Commission (SEC) has changed the

More information

INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh

INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh By Mark Rush and Joe Valenti K&L Gates Cyber crime is a serious threat it cripples companies, damages economies,

More information

Outsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk

Outsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk March 24, 2014 If you have any questions regarding the matters discussed in this memorandum, please contact the following attorneys or your regular Skadden contact. Stuart D. Levi New York / 212.735.2750

More information

2014 SUMMER EDUCATION CONFERENCE

2014 SUMMER EDUCATION CONFERENCE THE STATE BAR OF CALIFORNIA TRUSTS & ESTATES LAW SECTION PRESENTS Earn 7.0 Hours of MCLE & Legal Specialization Credits TRUSTS & ESTATES LAW SECTION 2014 SUMMER EDUCATION CONFERENCE MAY 30, 2014 Marina

More information

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies

More information

How to Prepare for a Data Breach

How to Prepare for a Data Breach IT Forum How to Prepare for a Data Breach Expediting Response and Minimizing Losses Presentation for SURA IT Committee November 5,,2014 Laura Whitaker, Senior Research Director eab.com Getting to Know

More information

CAMP BOOT. BASIC TRAINING FOR LAWYERS Get the Skills You Need to Successfully Compete in Today s Challenging Market

CAMP BOOT. BASIC TRAINING FOR LAWYERS Get the Skills You Need to Successfully Compete in Today s Challenging Market 14 BOOT CAMP BASIC TRAINING FOR LAWYERS Get the Skills You Need to Successfully Compete in Today s Challenging Market Tuesday, September 30, 2014 - and - Thursday, October 2, 2014 Presented by Committee

More information

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,

More information

ISRI INDUSTRY LEADERSHIP TRAINING PROGRAM

ISRI INDUSTRY LEADERSHIP TRAINING PROGRAM UNIVERSITY 2014 UNIVERSITYOF OFTEXAS TEXAS@@AUSTIN AUSTIN JUNE JUNE18-20, 2-6, 2015 UNIVERSITY OF TEXAS @ AUSTIN JUNE 2-6, 2015 Managing a scrap recycling business brings on unique challenges and situations

More information

HADDON TOWNSHIP BOARD OF EDUCATION 500 RHOADS AVENUE WESTMONT, NJ 08108 REQUEST FOR PROPOSAL

HADDON TOWNSHIP BOARD OF EDUCATION 500 RHOADS AVENUE WESTMONT, NJ 08108 REQUEST FOR PROPOSAL HADDON TOWNSHIP BOARD OF EDUCATION 500 RHOADS AVENUE WESTMONT, NJ 08108 REQUEST FOR PROPOSAL A. PURPOSE: The Haddon Township Board of Education is seeking proposals from qualified respondents as follows:

More information

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015 Cybersecurity Best Practices in Mortgage Banking Article by Jim Deitch Cybersecurity Best Practices in Mortgage Banking BY JIM DEITCH Jim Deitch Recent high-profile cyberattacks have clearly demonstrated

More information

Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance

Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance Baltimore Chapter Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance presented by Howard R. Feldman S. Keith Moulsdale hfeldman@wtplaw.com kmoulsdale@wtplaw.com 410.347.8793

More information

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 TH - 18 TH JUNE 2014 SWISSOTEL SYDNEY CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered by

More information

Chairman Johnson, Ranking Member Carper, and Members of the committee:

Chairman Johnson, Ranking Member Carper, and Members of the committee: UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

Perrin Conferences Emerging Insurance Coverage & Allocation Issues Conference

Perrin Conferences Emerging Insurance Coverage & Allocation Issues Conference Perrin Conferences Emerging Insurance Coverage & Allocation Issues Conference May 19, 2015 The Rittenhouse Hotel, Philadelphia, PA Chairs: David R. Gold, Senior Vice President-Direct Claims, Resolute Management,

More information

About the Survey Respondents

About the Survey Respondents SPECIAL REPORT Information Security & Cyber Liability Risk Management The Second Annual Survey of Enterprise-wide Cyber Risk Management Practices in Europe February 2013 SPECIAL REPORT Information Security

More information

e-discovery Conference

e-discovery Conference Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce

More information

Special Report The HITECH Act

Special Report The HITECH Act Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known

More information

Building Your Information Governance Framework

Building Your Information Governance Framework Building Your Information Governance Framework Wisconsin Law & Technology Conference 2015 Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative

More information

Current Issues Facing Private Equity & Hedge Fund Managers in Today s Changing Landscape

Current Issues Facing Private Equity & Hedge Fund Managers in Today s Changing Landscape Current Issues Facing Private Equity & Hedge Fund Managers in Today s Changing Landscape Wednesday, November 6, 2013 Program Chair Glenn Sarno Simpson Thacher & Bartlett LLP Faculty Barry Barbash Willkie

More information

New Directions new challenges

New Directions new challenges New Directions new challenges 2011 Workers Compensation Court Educational Conference September 15-16, 2011 Meridian Technology Center Stillwater, Oklahoma details/registration available at meridiantech.edu

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

Capital Defense College

Capital Defense College Capital Defense College A Program For The Defense Capital Defense College March 23-26, 2015 The Center for American and International Law Plano, Texas With the exception of invited faculty, attendance

More information

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator

More information

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Cybersecurity..Is your PE Firm Ready? October 30, 2014 Cybersecurity..Is your PE Firm Ready? October 30, 2014 The Panel Melinda Scott, Founding Partner, Scott Goldring Eric Feldman, Chief Information Officer, The Riverside Company Joe Campbell, CTO, PEF Services

More information

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile

JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise

More information

www.pwc.com Developing a robust cyber security governance framework 16 April 2015

www.pwc.com Developing a robust cyber security governance framework 16 April 2015 www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October

More information

New Leadership. A Defender Conference on Building Leadership and Political Outreach Skills. National Defender Leadership Institute

New Leadership. A Defender Conference on Building Leadership and Political Outreach Skills. National Defender Leadership Institute New Leadership 2002 A Defender Conference on Building Leadership and Political Outreach Skills..................... September 18-21, 2002 Omni Austin Hotel Downtown Austin,Texas National Defender Leadership

More information

- Public Defense in Tribal Courts - Tribal Taxation Issues in Washington

- Public Defense in Tribal Courts - Tribal Taxation Issues in Washington 28th ANNUAL INDIAN LAW SYMPOSIUM THURSDAY & FRIDAY SEPTEMBER 10 & 11, 2015 UNIVER SIT Y OF WA SHINGTON SCHOOL OF L AW WILLIAM H. G ATES HALL, SE AT TLE PROGRAM HIGHLIGHTS - Keynote by EPA s Deputy General

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE

More information

13 th Annual Tax & Securities Law Institute. T S L I March 5-6, 2015 Hyatt Regency New Orleans

13 th Annual Tax & Securities Law Institute. T S L I March 5-6, 2015 Hyatt Regency New Orleans 13 th Annual Tax & Securities Law Institute T S L I March 5-6, 2015 Hyatt Regency New Orleans Tax & Securities Law Institute 13 Th Annual March 5-6, 2015 Hyatt Regency New Orleans It s not April in Paris

More information

Cyber security: Are consumer companies up to the challenge?

Cyber security: Are consumer companies up to the challenge? Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

The Evolution of Data Breaches

The Evolution of Data Breaches The Evolution of Data Breaches 2015 Data Privacy & Security Summit June 29, 2015 Mark Shelhart Incident Response & Forensics Retail Data Security recent victims The Largest Cyber Risks to your Organization

More information

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data

More information

2015 Trademark Office Comes to California THURSDAY, APRIL 16, 2015 TUESDAY, APRIL 14, 2015

2015 Trademark Office Comes to California THURSDAY, APRIL 16, 2015 TUESDAY, APRIL 14, 2015 Earn 7.75 Hours MCLE Credit THE STATE BAR OF CALIFORNIA INTELLECTUAL PROPERTY LAW SECTION PRESENTS 2015 Trademark Office Comes to California TUESDAY, APRIL 14, 2015 Hyatt Regency Century Plaza 2025 Avenue

More information

ediscovery Institute

ediscovery Institute Registration Fee Early Bird Registration Fee (per person)... $235 After February 27, 2015... $275 Alumni Rate... $199 As information technology continues rapidly to grow and evolve in variety and format,

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>: , Dear : You are receiving this letter because computer thieves or hackers have gained access

More information

Office of Inspector General

Office of Inspector General National Aeronautics and Space Administration Office of Inspector General Washington, DC 20546-0001 February 4, 2010 The Honorable Barbara A. Mikulski Subcommittee on Commerce, Justice, Science, and Related

More information

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015 Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery

More information

INITIAL CONSULTATION AGREEMENT AND ACKNOWLEDGMENT OF RECEIPT OF DISCLOSURES

INITIAL CONSULTATION AGREEMENT AND ACKNOWLEDGMENT OF RECEIPT OF DISCLOSURES 303 Williams Avenue, Park Plaza Suite 921 Huntsville, Alabama 35801 Phone:256.535.0817 Fax: 256.535.0818 Web: www.heardlaw.com INITIAL CONSULTATION AGREEMENT AND ACKNOWLEDGMENT OF RECEIPT OF DISCLOSURES

More information

FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL

FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL Before the Subcommittee on Financial Institutions and Consumer

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014 Preventing And Dealing With Cyber Attacks And Data Breaches Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014 Charles A. Blanchard Arnold & Porter LLP Formerly General Counsel, U.S. Air Force

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF CONNECTICUT

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF CONNECTICUT UNITED STATES DISTRICT COURT FOR THE DISTRICT OF CONNECTICUT If you purchased products from U.S. Foodservice, Inc. (now known as US Foods, Inc.) under a cost-plus arrangement between 1998 and 2005, you

More information

Medical Ethics, Boundaries and Professionalism

Medical Ethics, Boundaries and Professionalism Sponsored by: Department of Bioethics & Continuing Medical Education Program INTENSIVE COURSE IN Medical Ethics, Boundaries and Professionalism February 4-5, 2016 September 15-16, 2016 DoubleTree by Hilton

More information

NATURAL GAS UTILITY BASICS

NATURAL GAS UTILITY BASICS COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry

More information

The New Role of Intellectual Property in Mergers, Acquisitions, and Private Equity Transactions

The New Role of Intellectual Property in Mergers, Acquisitions, and Private Equity Transactions BNA Presents a One-Day Conference on: The New Role of Intellectual Property in Mergers, Acquisitions, and Private Equity Transactions October 18, 2007 The Warwick Hotel How IP assets impact deal success,

More information

Cybersecurity: What In-House Counsel Needs to Know

Cybersecurity: What In-House Counsel Needs to Know Cybersecurity: What In-House Counsel Needs to Know November 19, 2013 Vivian A. Maese vivian.maese@dechert.com 2013 Dechert LLP So what does all of the legal activity in cybersecurity mean to you? The top

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION

INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST

More information