Dallas Agenda

8:30am – 9:00am
Continental Breakfast and Registration
9:00am – 9:10am
Welcome and Opening Remarks

9:10am – 9:30am
Session 1: Polling the Audience

  • What is your data security role at your organization?
  • What are your pain points, biggest issues?
  • What do you want to get out of the seminar?


Jami Mills Vibbert, Counsel, Venable LLP
Andrea D’Ambra, Partner, Norton Rose Fulbright US LLP

9:30am – 10:30am
Session 2: GDPR The New Cyber – Horizons in 2018

  • Implementation of the E.U. General Data Protection Regulations in May 2018
    • How it applies to U.S companies
    • What is Informed Consent under the GDPR?
    • Sanctions and Fines
  • IoT Devices
    • Unique Cybersecurity and Privacy Risks
    • Federal efforts to encourage IoT Security
  • DDoS Attacks
  • Privacy Shield


Justin Koplow, Senior Legal Counsel for Privacy and Data Protection, AT&T
Kathryne Morris, Member, Clark Hill | Strasburger
Frank Nolan, Counsel, Eversheds Sutherland

10:30am – 11:00am
Coffee Break

11:00am – 12:00pm
Session 3: Data Security and Privacy Litigation

  • Class Actions’ Viability — Injury (Standing)
    • The Spokeo Effect— 2017 appellate decisions, e.g.:
      • Attias v. CareFirst (D.C. Cir.)
      • Katz v. The Donna Karan Co. (2dCir.)
      • Kuhns v. Scottrade
      • Robins v. Spokeo on remand (9th Cir.)
  • New causes of action and theories of recovery
  • Data breach litigation in a small claims court
  • BIPA-Biometric Information Privacy Act
  • Am I covered? Insurance coverage and related litigation
    • Engl v. Natural Grocers
    • Equifax


Jeffrey Schultz, Partner and Co-Leader, Privacy and Data Security Practice Area, Armstrong Teasdale
Jason Scheiderer, Partner, Dentons
Frank Nolan, Counsel, Eversheds Sutherland
Stephen Embry , embryLaw LLC

12:00pm – 1:00pm
Networking Luncheon

1:00pm- 2:00pm
Session 4: Fighting the Cyber War: Corporate Governance, People and Process

  • Where are you today? Where do you want/need to be?
  • Extracting Lessons Learned from 2017 Security Incidents
  • Proactive Risk Assessments – Prioritizing Your Security Controls
    • Risk appetite
    • “mining the dark web”
  • Cloud Migration Mishaps
  • Due Diligence in Deals
    • Yahoo!
  • Creating a Security Culture
  • Are structured to respond?
    • Building and implementing a comprehensive response plan
  • Board responsibility for cyber
    • Yahoo securities class action settlement
  • Enforcing best practices for corrective actions
  • Considering Insider Threat
  • Maintaining privilege when investigating internal issues
  • Impact of failure
    • Loss of customer confidence, market share, and valuation


Alain Espinosa, Cybersecurity Adviser, Board Director, InfradGard National Members Alliance
Emily Westridge Black, Partner, Haynes and Boone LLP
Steve McNew , Senior Managing Director, FTI Technology

2:00pm – 3:00pm
Session 5: The Dark Side of Digitalization

    • Darknet/TOR
    • Cybercriminals, recent arrests, and the impact on the threat landscape
    • International cooperation
    • Geolocation challenges
    • Anomaly Detection: Breaking the code of Zero Days
    • Vulnerability programs – what are they and when can you white hat hack


    Alain Espinosa, Cybersecurity Adviser, Board Director, InfradGard National Members Alliance
    Suzanne Magee , Founder, Bandura LLC

3:00pm – 3:30pm
Networking Break

3:30pm – 4:30pm
Session 6: Understanding Cryptocurrencies and Blockchain

  • Crypto-currencies
    • What are they?
    • Who regulates them or rather who doesn’t?
    • The KYC (know your client) rule with cryptocurrencies
    • Why companies need to care
  • Blockchain
    • The in’s and out’s
    • The different flavors of Blockchain
      • Public (Ethereum) vs. Private (Quorum)
        • Which fits your case?


Stephen Embry, embryLaw LLC
Suzanne Magee , Founder, Bandura LLC

4:30pm – 5:30pm
Networking Reception


8:30am – 9:00am
Continental Breakfast
9:00am – 10:00am
Session 7: The Weapons of Cyber War

  • Defining your cyber-borders
  • Training your troops
  • Perimeter Defenses – Secure your employees where they are
  • User-based rules
  • Defense in Depth
  • Security by Design
  • Monitoring and threat detection
    • “I didn’t know” is no longer acceptable
  • Actionable Intelligence: Need for Trusted Processes and Workflows (Automation and Orchestration)
  • Pen-testing


Suzanne Magee , Founder, Bandura LLC
Tim Newman , Partner, Haynes and Boone LLP

10:00am – 11:00am
Session 8: Healthcare and Life Sciences

  • FDA guidance on interoperability and cybersecurity of connected medical devices
  • OCR fines and HIPAA breaches
  • Security and privacy issues in healthcare mergers and acquisitions
  • Data analytics and big data in healthcare and life sciences
  • Security and privacy concerns with digital health


Thora Johnson, Partner, Venable LLP
Steve McNew , Senior Managing Director, FTI Technology

11:00am – 11:30am
Coffee Break

11:30am – 12:30pm
Session 9: Ethics in Cybersecurity

  • Threat landscape for law firms
  • Ethical obligations of law firms to protect client data (and understand technology)
  • How are companies (especially in regulated industries) scrutinizing and managing law firms?
  • What do you require of opposing counsel and other third parties when turning over information?
  • What assurances do we have from the government with sensitive info?
  • Ethical obligations when advising client on how to handle cybersecurity-related legal issues
  • Balancing legal preservation obligations with real word operational concerns


Kathryne Morris, Member, Clark Hill | Strasburger
Karen Hornbeck, Director, Consilio
Jason Scheiderer , Partner, Dentons


Agenda is subject to change.