Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down
|
|
- Caroline Kelley
- 8 years ago
- Views:
Transcription
1 Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification & Investigation Notification Issues, Internal & External Incident Response Strategies Working with Clients, the Government Wednesday, May 29, :00 a.m. 12:30 p.m. The Yale Club 50 Vanderbilt Avenue New York City Sponsor:
2 Law Firms: Highly Vulnerable Targets Revising Your Strategy to be Prepared and Responsive, Acting Decisively and Promptly Add to the top of your risk list: data thieves. Increasingly, hackers and intruders, both internal and external, have realized that law firms may be the soft underbelly of the system. Therein lies opportunity for the criminally inclined and a complicated set of new challenges for those charged with dealing with clients and protecting their firms sensitive information. Cyber Security is not just an IT issue anymore. It requires the attention of senior legal leadership and business executives and, also, early interdiction by the team to protect clients, employees, partners, third parties, and the firm. This update is the first to address these issues from the top down. We have specifically tailored the agenda to analyze particular, often unique, issues law firms must face including: The business model of a law firm is based on leveraging the work product from old matters to new situations. This open access and sharing are a potential information security weakness. They run counter to sound information practices. How do you respond to this challenge? What is the best governance structure to deal with cyber security incidents and response? Notification issues/strategies (47 states have breach notification laws) What is the appropriate trigger for notifying a client, all clients, one or more partners, third parties, and law enforcement? What should be the mechanism for notification? What strategy should you pursue for dealing with the increasing number of client security provisions built into fee arrangements? Should you work with a security company to investigate, assess, and suggest solutions? What do the lawyer leaders at the firm need to know about a breach or hack? Case Studies: A strengthening market means firms are seeing transactions and mergers in greater number and size and receiving more company data. How do cyber intrusion threats affect due diligence, negotiations, contract terms, etc.? In the financial services sector, which has expressed concerns about law firms being the weak link in the security chain, how should you deal with client security requests and potential legal liability questions? Firms increasingly are receiving lengthy questionnaires about firm IT practices and asked for certifications on policies and protocols. How should you respond to these audits? Who Should Attend? Chairman, Managing Partners, Executive Committee Members, Partner Heads of Technology Committee, Risk Committee, IP, Litigation Practice Group Leaders, COO, Executive Directors, CTO, CIO, General Counsel
3 FROM THE GOVERNMENT: Judith H. Germano, Chief, Economic Crimes Unit, Assistant U.S. Attorney, U.S. Attorney s Office, District of New Jersey, Department of Justice, Newark, NJ PANELISTS: Andreas M. Antoniou, Chief Information Officer, Paul, Weiss, Rifkind, Wharton & Garrison, NYC Mitchell J. Auslander, Partner, Chairman of Risk Committee, Willkie Farr & Gallagher, NYC Lawrence J. Bracken II, Partner, Hunton & Williams, Atlanta Bob Bratt, Chief Operating Officer and Executive Director, U.S. Operations, DLA Piper, Washington D.C. Dave Canfield, Managing Director Client Solutions, UnitedLex, NYC James A. Harvey, Partner, Head of Technology, Privacy & IP Transactions Group, Alston & Bird, Washington D.C. Don Jaycox, Chief Information Officer, Americas, DLA Piper, San Diego Stuart D. Levi, Partner, Chairman of Technology Committee, Skadden, NYC Alan Charles Raul, Partner, Sidley Austin, Washington D.C. William Wynne, Jr., Partner, Chairman of Risk Management Committee, White & Case, NYC PROGRAM HIGHLIGHTS: 8:30 9:00 a.m. Breakfast & Registration; 9:00 a.m. 12:30 p.m. Program A. Defining Cyber Crime in the Law Firm Context: Data Breaches, Hacking, Trade Secrets B. Who and What Types of Threats Are Most Significant The View from the U.S. Attorney s Office 1. How to separate the serious threats from the mere annoyances 2. Threats externally and within your organization 3. Economic espionage 4. State sponsored attacks C. Firm Governance: To what extent should law firm leadership be involved/informed of cyber risk? Cyber security incident response? D. What is an effective strategy for dealing with the increasing number of client security provisions and questionnaires built into contractual requirements? E. Incident Response Strategies 1. Notification Issues/Strategies: What is the trigger for notifying a client of a security incident? All clients? One or more partners? Law enforcement? What is the notification mechanism? 2. What does a successful response to a cyber attack look like? 3. Who is included in responding; who is on the team internally; how long does it take? 4. How do you determine the objective of an attack? 5. Liability Insurance F. Risk Management Oversight including Training, Outside Consultants G. Working with Clients 1. Strategies for protecting sensitive data 2. How to curtail losses clients might suffer 3. As the deal market strengthens with greater number and size of transactions firms have more company data. How does a cyber intrusion affect due diligence, negotiations, contracts 4. Law firm as third party; Policies, protocols, assessments, certifications, and questionnaires H. Working with the Government 1. At what point do you involve the Government? 2. Lessons to be learned and information sharing I. Intellectual Property Issues 1. Data protection 2. Privacy considerations with clients, firm partners and staff 3. Cyber Security Concerns 4. Special issues including Bring Your Own Device (BYOD). Firm Policies and Protocols J. Ethical Issues
4 LAW FIRM CYBER RISK CONFERENCE Wednesday, May 29, 2013, New York; 9:00 a.m. 12:30 p.m. The Yale Club of New York, 50 Vanderbilt Avenue, New York TO REGISTER: E MAIL HULisaColombo@sandpiperpartners.comUH, PHONE , or FAX or MAIL Sandpiper Partners LLC, 855 Valley Road, Suite 209, Clifton, NJ Name: Position: Firm: Address: City: State: Zip: Phone: **REGISTER VIA E MAIL & SAVE $50 OFF REGISTRATION PRICE** Fee: $495 (includes educational meeting, materials, breakfast, coffee break). Registration fee must be paid in advance, by May 22, Method of Payment: (Please check your preferred method) Check (payable to Sandpiper Partners LLC) Credit Card: AMEX Visa MasterCard Card Number Expiration Date Billing Address Signature Cancellations: The deadline for cancellations is Wednesday, May 22, 2013, 4 p.m. ET. A refund, less an administration charge of $100, will be given. After this date, no refunds will be made. Substitutions may be made at any time. CLE credit including ethics credit has been applied for. Conference Organizer Sandpiper Partners is a consulting firm run by highly successful entrepreneurs, Lynn and Stephen Glasser, who have decades of experience producing business of law, educational events, surveys, publications and solutions for law firms. The Glassers designed and implemented the first ever Executive MBA for Law Firm Managers. Sandpiper Partners has organized and presented a series of groundbreaking conferences on cyber crime and the cyber threat landscape for the business community. HUwww.sandpiperpartners.comUHU. Sponsor If you no longer wish to receive these s, please reply to this message with "Unsubscribe" in the subject line or message body or please send a letter including your name, request for discontinuance, and address to: Sandpiper Partners LLC, 855 Valley Road, Second Floor, Clifton, NJ
5
Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!
EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith
More information8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD
8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 th - 18 th June 2014 Swissotel Sydney CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered
More informationEDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS
EDISCOVERY FOR FEDERAL GOVERNMENT PRACTITIONERS Wednesday, June 25, 2014 Georgetown University Law Center Washington, DC CLE 7.0 CLE credit hours (based on a 60-minute credit hour) including 1.0 ethics
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationThe 2014 IP and The. Internet Conference. The Luxe Hotel-Sunset Blvd 11461 Sunset Blvd. Thursday, June 12, 2014. applies to Legal Ethics
Earn 7.25 Hours MCLE of which 1.0 Hour applies to Legal Ethics The State Bar of California Intellectual property section Presents The 2014 IP and The Internet Conference Thursday, June 12, 2014 The Luxe
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationHOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationMinnesota State Bar Association Continuing Legal Education. Medical Devices: Law and Strategy
Minnesota State Bar Association Continuing Legal Education Patent Protection for Medical Devices: Law and Strategy Learn what every patent lawyer should know about this dynamic and complex area of law,
More informationCAMP BOOT BASIC TRAINING FOR LAWYERS. Get the Skills You Need. to Successfully Compete in Today s Challenging Market REGISTER
BOOT BASIC TRAINING FOR LAWYERS CAMP Get the Skills You Need 13 to Successfully Compete in Today s Challenging Market Presented by Committee on Career Advancement and Management and Committee on Law Student
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationThe Home Depot Provides Update on Breach Investigation
The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers
More informationWorking with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
More informationFINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE
FULLY ACCREDITED IN-CLASS PROGRAM & LIVE WEBINAR Toronto, June 9 Webinar, June 9 REGISTER BEFORE MAY 13 AND SAVE OVER $300 FINTECH, A RADICAL NEW PARADIGM IN CANADIAN FINANCE FINANCE THREATS REGULATORY
More informationCodes of Conduct and Corporate Social Responsibility:
NEW YORK STATE BAR ASSOCIATION Codes of Conduct and Corporate Social Responsibility: 3 r d An n u a l Co n f e r e n c e o n In t e r n at i o n a l Em p l o y m e n t La w Held at White & Case LLP 1155
More informationThis notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.
RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every
More informationDEVELOPMENTS AND TRENDS IN HEALTHCARE LAW 2015
DEVELOPMENTS AND TRENDS IN HEALTHCARE LAW 2015 Co-sponsored with the Health Law Section of the Alabama State Bar September 11, 2015 Birmingham Marriott Birmingham, Alabama 6 CLE hours, including 1 hour
More informationPosted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am
1 of 7 5/8/2014 7:34 PM Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am Editor s Note: David A. Katz is a partner at Wachtell, Lipton, Rosen & Katz specializing
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationCyber Security: The Growing Liability of Handheld & Mobile Devices
Cyber Security: The Growing Liability of Handheld & Mobile Devices 1 About Advisen: Advisen Ltd. is a privately-owned, independent and unbiased provider of news, data and risk analytics to the commercial
More informationE-Discovery. A Practical Guide to
Minnesota State Bar Association Continuing Legal Education Your State Bar at Work for You A Practical Guide to E-Discovery This seminar goes beyond simple summaries of the changes to the Rules of Civil
More informationAIPLA. electronics & computer patent law summit. august 16, 2011. william mitchell college of law 875 summit ave. st. paul, mn 55105. www.aipla.
electronics & computer patent law summit august 16, 2011 william mitchell college of law 875 summit ave. st. paul, mn 55105 american intellectual property law association 241 18th street south, suite 700
More informationFUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationWhy is this National Cyber Security Month? Stephen G. Austin, CPA, MBA Swenson Advisors, LLP
Why is this National Cyber Security Month? Stephen G. Austin, CPA, MBA, LLP Created as a collaborative effort between government and industry to ensure every American has the resources they need to stay
More informationFUNDAMENTALS OF MUNICIPAL BOND LAW SEMINAR
2014 FUNDAMENTALS OF MUNICIPAL BOND LAW SEMINAR April 30 - May 2, 2014 Grand Hyatt Atlanta Atlanta, GA You rm Att issi e cam nd a on: th p to h r one ee day you b r sk oot ills. Are You Ready?! Do you
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationHacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities
WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer
More informationCyber Security for the Private Sector: What Companies and Their Lawyers Need to Know
Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know Gus Coldebella, Goodwin Procter LLP John Geschke, VP and General Counsel, Zendesk, Inc. Jim Jaeger, VP, Cybersecurity
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationCYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015
BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting
More informationStrengthening Utility Critical
WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White
More informationMERCER COUNTY BAR ASSOCIATION XTREME CLE. 2.0 NJ CLE Credits. Charles Centinaro, Esq., Director of Attorney Ethics
MERCER COUNTY BAR ASSOCIATION XTREME CLE COURSE TITLE: LOCATION: Ethics with Charles Centinaro 2.0 NJ CLE Credits The Conference Center at MCCC DATE: Wednesday, October 29, 2014 TIME: SPEAKERS: 8:00 am
More informationCorporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationCybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
More informationUnprecedented Hacking and Trading Scheme Highlights Important Cybersecurity Lessons
Securities Enforcement and Data, Privacy & Security Practice Groups August 21, 2015 Unprecedented Hacking and Trading Scheme Highlights Important Cybersecurity Lessons DOJ and SEC charge hackers and traders
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Managing risk associated with third-party outsourcing
More information$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP
David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!
More informationCyber Risks Connect With Directors and Officers
Cyber Risks Connect With Directors and Officers Implications of the New SEC Guidance on Cyber Security February 2012 Lockton Companies, LLC The Securities and Exchange Commission (SEC) has changed the
More informationINFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh
INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh By Mark Rush and Joe Valenti K&L Gates Cyber crime is a serious threat it cripples companies, damages economies,
More informationOutsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk
March 24, 2014 If you have any questions regarding the matters discussed in this memorandum, please contact the following attorneys or your regular Skadden contact. Stuart D. Levi New York / 212.735.2750
More information2014 SUMMER EDUCATION CONFERENCE
THE STATE BAR OF CALIFORNIA TRUSTS & ESTATES LAW SECTION PRESENTS Earn 7.0 Hours of MCLE & Legal Specialization Credits TRUSTS & ESTATES LAW SECTION 2014 SUMMER EDUCATION CONFERENCE MAY 30, 2014 Marina
More informationManaging Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
More informationHow to Prepare for a Data Breach
IT Forum How to Prepare for a Data Breach Expediting Response and Minimizing Losses Presentation for SURA IT Committee November 5,,2014 Laura Whitaker, Senior Research Director eab.com Getting to Know
More informationCAMP BOOT. BASIC TRAINING FOR LAWYERS Get the Skills You Need to Successfully Compete in Today s Challenging Market
14 BOOT CAMP BASIC TRAINING FOR LAWYERS Get the Skills You Need to Successfully Compete in Today s Challenging Market Tuesday, September 30, 2014 - and - Thursday, October 2, 2014 Presented by Committee
More informationLegal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
More informationISRI INDUSTRY LEADERSHIP TRAINING PROGRAM
UNIVERSITY 2014 UNIVERSITYOF OFTEXAS TEXAS@@AUSTIN AUSTIN JUNE JUNE18-20, 2-6, 2015 UNIVERSITY OF TEXAS @ AUSTIN JUNE 2-6, 2015 Managing a scrap recycling business brings on unique challenges and situations
More informationHADDON TOWNSHIP BOARD OF EDUCATION 500 RHOADS AVENUE WESTMONT, NJ 08108 REQUEST FOR PROPOSAL
HADDON TOWNSHIP BOARD OF EDUCATION 500 RHOADS AVENUE WESTMONT, NJ 08108 REQUEST FOR PROPOSAL A. PURPOSE: The Haddon Township Board of Education is seeking proposals from qualified respondents as follows:
More informationCybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015
Cybersecurity Best Practices in Mortgage Banking Article by Jim Deitch Cybersecurity Best Practices in Mortgage Banking BY JIM DEITCH Jim Deitch Recent high-profile cyberattacks have clearly demonstrated
More informationPractical Lessons Learned: An Overview of Cybersecurity Law & Information Governance
Baltimore Chapter Practical Lessons Learned: An Overview of Cybersecurity Law & Information Governance presented by Howard R. Feldman S. Keith Moulsdale hfeldman@wtplaw.com kmoulsdale@wtplaw.com 410.347.8793
More informationINFORMATION GOVERNANCE AND EDISCOVERY SUMMIT
INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 TH - 18 TH JUNE 2014 SWISSOTEL SYDNEY CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered by
More informationChairman Johnson, Ranking Member Carper, and Members of the committee:
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT STATEMENT OF THE HONORABLE KATHERINE ARCHULETA DIRECTOR U.S. OFFICE OF PERSONNEL MANAGEMENT before the COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS
More informationDATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
More informationNIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
More informationPerrin Conferences Emerging Insurance Coverage & Allocation Issues Conference
Perrin Conferences Emerging Insurance Coverage & Allocation Issues Conference May 19, 2015 The Rittenhouse Hotel, Philadelphia, PA Chairs: David R. Gold, Senior Vice President-Direct Claims, Resolute Management,
More informationAbout the Survey Respondents
SPECIAL REPORT Information Security & Cyber Liability Risk Management The Second Annual Survey of Enterprise-wide Cyber Risk Management Practices in Europe February 2013 SPECIAL REPORT Information Security
More informatione-discovery Conference
Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce
More informationSpecial Report The HITECH Act
Special Report The HITECH Act Privacy and Data Breach Notification Provision An Overview of the HITECH Act On February 17, 2009, President Obama signed into law the $787 billion stimulus package known
More informationBuilding Your Information Governance Framework
Building Your Information Governance Framework Wisconsin Law & Technology Conference 2015 Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative
More informationCurrent Issues Facing Private Equity & Hedge Fund Managers in Today s Changing Landscape
Current Issues Facing Private Equity & Hedge Fund Managers in Today s Changing Landscape Wednesday, November 6, 2013 Program Chair Glenn Sarno Simpson Thacher & Bartlett LLP Faculty Barry Barbash Willkie
More informationNew Directions new challenges
New Directions new challenges 2011 Workers Compensation Court Educational Conference September 15-16, 2011 Meridian Technology Center Stillwater, Oklahoma details/registration available at meridiantech.edu
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationCapital Defense College
Capital Defense College A Program For The Defense Capital Defense College March 23-26, 2015 The Center for American and International Law Plano, Texas With the exception of invited faculty, attendance
More informationCybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
More informationCybersecurity..Is your PE Firm Ready? October 30, 2014
Cybersecurity..Is your PE Firm Ready? October 30, 2014 The Panel Melinda Scott, Founding Partner, Scott Goldring Eric Feldman, Chief Information Officer, The Riverside Company Joe Campbell, CTO, PEF Services
More informationJOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
More informationwww.pwc.com Developing a robust cyber security governance framework 16 April 2015
www.pwc.com Developing a robust cyber security governance framework 16 April 2015 Cyber attacks are ubiquitous Anonymous hacker group declares cyber war on Hong Kong government, police - SCMP, 2 October
More informationNew Leadership. A Defender Conference on Building Leadership and Political Outreach Skills. National Defender Leadership Institute
New Leadership 2002 A Defender Conference on Building Leadership and Political Outreach Skills..................... September 18-21, 2002 Omni Austin Hotel Downtown Austin,Texas National Defender Leadership
More information- Public Defense in Tribal Courts - Tribal Taxation Issues in Washington
28th ANNUAL INDIAN LAW SYMPOSIUM THURSDAY & FRIDAY SEPTEMBER 10 & 11, 2015 UNIVER SIT Y OF WA SHINGTON SCHOOL OF L AW WILLIAM H. G ATES HALL, SE AT TLE PROGRAM HIGHLIGHTS - Keynote by EPA s Deputy General
More informationWRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON THE JUDICIARY HEARING ON PRIVACY IN THE DIGITAL AGE: PREVENTING DATA BREACHES AND COMBATING CYBERCRIME FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN EXECUTIVE
More information13 th Annual Tax & Securities Law Institute. T S L I March 5-6, 2015 Hyatt Regency New Orleans
13 th Annual Tax & Securities Law Institute T S L I March 5-6, 2015 Hyatt Regency New Orleans Tax & Securities Law Institute 13 Th Annual March 5-6, 2015 Hyatt Regency New Orleans It s not April in Paris
More informationCyber security: Are consumer companies up to the challenge?
Cyber security: Are consumer companies up to the challenge? 1 Cyber security: Are consumer companies up to the challenge? A survey of webcast participants kpmg.com 1 Cyber security: Are consumer companies
More informationCyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More informationThe Evolution of Data Breaches
The Evolution of Data Breaches 2015 Data Privacy & Security Summit June 29, 2015 Mark Shelhart Incident Response & Forensics Retail Data Security recent victims The Largest Cyber Risks to your Organization
More informationProtecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks
Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data
More information2015 Trademark Office Comes to California THURSDAY, APRIL 16, 2015 TUESDAY, APRIL 14, 2015
Earn 7.75 Hours MCLE Credit THE STATE BAR OF CALIFORNIA INTELLECTUAL PROPERTY LAW SECTION PRESENTS 2015 Trademark Office Comes to California TUESDAY, APRIL 14, 2015 Hyatt Regency Century Plaza 2025 Avenue
More informationediscovery Institute
Registration Fee Early Bird Registration Fee (per person)... $235 After February 27, 2015... $275 Alumni Rate... $199 As information technology continues rapidly to grow and evolve in variety and format,
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationIntroduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com
More information<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:
, Dear : You are receiving this letter because computer thieves or hackers have gained access
More informationOffice of Inspector General
National Aeronautics and Space Administration Office of Inspector General Washington, DC 20546-0001 February 4, 2010 The Honorable Barbara A. Mikulski Subcommittee on Commerce, Justice, Science, and Related
More informationInsulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015
Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery
More informationINITIAL CONSULTATION AGREEMENT AND ACKNOWLEDGMENT OF RECEIPT OF DISCLOSURES
303 Williams Avenue, Park Plaza Suite 921 Huntsville, Alabama 35801 Phone:256.535.0817 Fax: 256.535.0818 Web: www.heardlaw.com INITIAL CONSULTATION AGREEMENT AND ACKNOWLEDGMENT OF RECEIPT OF DISCLOSURES
More informationFIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL
FIGHTING FRAUD: IMPROVING INFORMATION SECURITY TESTIMONY OF JOHN J. BRADY VICE PRESIDENT, MERCHANT FRAUD CONTROL MASTERCARD INTERNATIONAL Before the Subcommittee on Financial Institutions and Consumer
More informationCYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
More informationPreventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014
Preventing And Dealing With Cyber Attacks And Data Breaches Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014 Charles A. Blanchard Arnold & Porter LLP Formerly General Counsel, U.S. Air Force
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationUNITED STATES DISTRICT COURT FOR THE DISTRICT OF CONNECTICUT
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF CONNECTICUT If you purchased products from U.S. Foodservice, Inc. (now known as US Foods, Inc.) under a cost-plus arrangement between 1998 and 2005, you
More informationMedical Ethics, Boundaries and Professionalism
Sponsored by: Department of Bioethics & Continuing Medical Education Program INTENSIVE COURSE IN Medical Ethics, Boundaries and Professionalism February 4-5, 2016 September 15-16, 2016 DoubleTree by Hilton
More informationNATURAL GAS UTILITY BASICS
COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry
More informationThe New Role of Intellectual Property in Mergers, Acquisitions, and Private Equity Transactions
BNA Presents a One-Day Conference on: The New Role of Intellectual Property in Mergers, Acquisitions, and Private Equity Transactions October 18, 2007 The Warwick Hotel How IP assets impact deal success,
More informationCybersecurity: What In-House Counsel Needs to Know
Cybersecurity: What In-House Counsel Needs to Know November 19, 2013 Vivian A. Maese vivian.maese@dechert.com 2013 Dechert LLP So what does all of the legal activity in cybersecurity mean to you? The top
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationPRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION
INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST
More information