Boston Agenda

→  Up to 10 CLE credits (including 1 ethics) for RI attorneys!

8:30am – 9:00am
Continental Breakfast and Registration
9:00am – 9:10am
Welcome and Opening Remarks

9:10am – 9:30am
Session 1: Polling the Audience

  • What is your data security role at your organization?
  • What are your pain points, biggest issues?
  • What do you want to get out of the seminar?

9:30am – 10:30am
Session 2: GDPR The New Cyber – Horizons in 2018

  • Implementation of the E.U. General Data Protection Regulations in May 2018
    • How it applies to U.S companies
    • What is Informed Consent under the GDPR?
    • Sanctions and Fines
  • IoT Devices
    • Unique Cybersecurity and Privacy Risks
    • Federal efforts to encourage IoT Security
  • DDoS Attacks
  • Privacy Shield

10:30am – 11:00am
Coffee Break

11:00am – 12:00pm
Session 3: Data Security and Privacy Litigation

  • Class Actions’ Viability — Injury (Standing)
    • The Spokeo Effect— 2017 appellate decisions, e.g.:
    • Attias v. CareFirst (D.C. Cir.)
    • Katz v. The Donna Karan Co. (2dCir.)
    • Kuhns v. Scottrade
    • Robins v. Spokeo on remand (9th Cir.)
  • New causes of action and theories of recovery
  • Am I covered? Insurance coverage and related litigation
    • Engl v. Natural Grocers
    • Equifax

12:00pm – 1:00pm
Networking Luncheon

1:00pm- 2:00pm
Session 4: Fighting the Cyber War: Corporate Governance, People and Process

  • Where are you today?Where do you want/need to be?
  • Extracting Lessons Learned from 2017 Security Incidents
  • Proactive Risk Assessments – Prioritizing Your Security Controls
    • Risk appetite
    • “mining the dark web”
  • Cloud Migration Mishaps
  • Due Diligence in Deals
    • Yahoo!
  • Creating a Security Culture
  • Are structured to respond?
    • Building and implementing a comprehensive response plan
  • Board responsibility for cyber
  • Enforcing best practices for corrective actions
  • Considering Insider Threat
  • Impact of failure
    • Loss of customer confidence, market share, and valuation

2:00pm – 3:00pm
Session 5: The Dark Side of Digitalization

    • Darknet/TOR
    • Cybercriminals, recent arrests, and the impact on the threat landscape
    • International cooperation
    • Geolocation challenges
    • Anomaly Detection: Breaking the code of Zero Days
    • Vulnerability programs – what are they and when can you white hat hack

3:00pm – 3:30pm
Networking Break

3:30pm – 4:30pm
Session 6: Understanding Cryptocurrencies and Blockchain

  • Crypto-currencies
    • What are they?
    • Why companies need to care
  • Blockchain
    • The in’s and out’s

4:30pm – 5:30pm
Networking Reception

 

8:30am – 9:00am
Continental Breakfast
9:00am – 10:00am
Session 7: The Weapons of Cyber War

  • Defining your cyber-borders
  • Training your troops
  • Perimeter Defenses – Secure your employees where they are
  • User-based rules
  • Defense in Depth
  • Security by Design
  • Monitoring and threat detection
    • “I didn’t know” is no longer acceptable
  • Actionable Intelligence: Need for Trusted Processes and Workflows (Automation and Orchestration)
  • Pen-testing

10:00am – 11:00am
Session 8: Healthcare and Life Sciences

  • FDA guidance on interoperability and cybersecurity of connected medical devices
  • OCR fines and HIPAA breaches
  • Security and privacy issues in healthcare mergers and acquisitions
  • Data analytics and big data in healthcare and life sciences
  • Security and privacy concerns with digital health

11:00am – 11:30am
Coffee Break

11:30am – 12:30pm
Session 9: Ethics in Cybersecurity

  • Threat landscape for law firms
  • Ethical obligations of law firms to protect client data (and understand technology)
  • How are companies (especially in regulated industries) scrutinizing and managing law firms?
  • What do you require of opposing counsel and other third parties when turning over information?
  • What assurances do we have from the government with sensitive info?
  • Ethical obligations when advising client on how to handle cybersecurity-related legal issues
  • Balancing legal preservation obligations with real word operational concerns

 

Agenda is subject to change.