Dallas Agenda

8:30am – 9:00am
Continental Breakfast and Registration
9:00am – 9:10am
Welcome and Opening Remarks

9:10am – 9:30am
Session 1: Polling the Audience

  • What is your data security role at your organization?
  • What are your pain points, biggest issues?
  • What do you want to get out of the seminar?


Jami Mills Vibbert, Counsel, Venable LLP
Andrea D’Ambra, Partner, Norton Rose Fulbright US LLP

9:30am – 10:30am
Session 2: New Cyber and Privacy Issues

  • CCPA and US Privacy Laws
  • Global Privacy Law Roundup – LGPD, APP, China, Japan
  • GDPR-Reflections on Implementation and Enforcement
  • IoT Devices
    • Unique Cybersecurity and Privacy Risks
    • Federal efforts to encourage IoT Security

10:30am – 11:00am
Coffee Break

11:00am – 12:00pm
Session 3: Data Security and Privacy Litigation

  • Class Actions’ Viability — Injury (Standing)
    • The Spokeo Effect— 2017 appellate decisions, e.g.:
      • Attias v. CareFirst (D.C. Cir.)
      • Katz v. The Donna Karan Co. (2dCir.)
      • Kuhns v. Scottrade
      • Robins v. Spokeo on remand (9th Cir.)
  • New causes of action and theories of recovery
  • Data breach litigation in a small claims court
  • BIPA-Biometric Information Privacy Act
  • Am I covered? Insurance coverage and related litigation
    • Engl v. Natural Grocers
    • Equifax

12:00pm – 1:00pm
Networking Luncheon

1:00pm- 2:00pm
Session 4: Fighting the Cyber War: Corporate Governance, People and Process

  • Where are you today? Where do you want/need to be?
  • Extracting Lessons Learned from 2017 Security Incidents
  • Proactive Risk Assessments – Prioritizing Your Security Controls
    • Risk appetite
    • “mining the dark web”
  • Cloud Migration Mishaps
  • Due Diligence in Deals
    • Yahoo!
  • Creating a Security Culture
    • workforce enablement, device security, BYOD, etc.
  • Are structured to respond?
    • Building and implementing a comprehensive response plan
  • Board responsibility for cyber
    • Yahoo securities class action settlement
  • Enforcing best practices for corrective actions
  • Considering Insider Threat
  • Maintaining privilege when investigating internal issues
  • Impact of failure
    • Loss of customer confidence, market share, and valuation

2:00pm – 3:00pm
Session 5: The Dark Side of Digitalization

    • Darknet/TOR
    • Cybercriminals, recent arrests, and the impact on the threat landscape
    • Mobile threats (including voice)
    • International cooperation
    • Geolocation challenges
    • Anomaly Detection: Breaking the code of Zero Days
    • Vulnerability programs – what are they and when can you white hat hack

3:00pm – 3:30pm
Networking Break

3:30pm – 4:30pm
Session 6: Managing the Supply Chain

  • U.S. Government efforts to secure DoD supply chains
  • CMMC, NIST 800-171 updates, DCMA audits
  • Crypto-currencies
    • What are they?
    • Who regulates them or rather who doesn’t?
    • The KYC (know your client) rule with cryptocurrencies
    • Why companies need to care
  • Blockchain
    • The in’s and out’s
    • The different flavors of Blockchain
      • Public (Ethereum) vs. Private (Quorum)
        • Which fits your case?

4:30pm – 5:30pm
Networking Reception


8:30am – 9:00am
Continental Breakfast
9:00am – 10:00am
Session 7: The Weapons of Cyber War

  • Defining your cyber-borders
  • Training your troops
  • Perimeter Defenses – Secure your employees where they are
  • User-based rules
  • Defense in Depth
  • Security by Design
  • Monitoring and threat detection
    • “I didn’t know” is no longer acceptable
  • Actionable Intelligence: Need for Trusted Processes and Workflows (Automation and Orchestration)
  • Pen-testing

10:00am – 11:00am
Session 8: Healthcare and Life Sciences

  • FDA guidance on interoperability and cybersecurity of connected medical devices
  • OCR fines and HIPAA breaches
  • Security and privacy issues in healthcare mergers and acquisitions
  • Data analytics and big data in healthcare and life sciences
  • Security and privacy concerns with digital health

11:00am – 11:30am
Coffee Break

11:30am – 12:30pm
Session 9: Ethics in Cybersecurity

  • Threat landscape for law firms
  • Ethical obligations of law firms to protect client data (and understand technology)
  • How are companies (especially in regulated industries) scrutinizing and managing law firms?
  • What do you require of opposing counsel and other third parties when turning over information?
  • What assurances do we have from the government with sensitive info?
  • Ethical obligations when advising client on how to handle cybersecurity-related legal issues
  • Balancing legal preservation obligations with real word operational concerns


Agenda is subject to change.


Do NOT follow this link or you will be banned from the site!