Los Angeles Agenda

8:30am – 9:00am
Continental Breakfast and Registration
9:00am – 9:10am
Welcome and Opening Remarks

9:10am – 9:30am
Session 1: Polling the Audience

  • What is your data security role at your organization?
  • What are your pain points, biggest issues?
  • What do you want to get out of the seminar?


Alex Major, Partner, McCarter & English, LLP
Andrea D’Ambra, Partner, Norton Rose Fulbright US LLP
Holly Brady, Sr. Associate, Hunton Andrews Kurth LLP

9:30am – 10:30am
Session 2: New Cyber and Privacy Issues

  • CCPA , Nevada’s SB220 and US Privacy Laws
  • Global Privacy Law Roundup – GDPR, LGPD, APP, China, Japan
  • Reflections on Implementation and Enforcement of Privacy Laws
  • IoT Devices
    • Unique Cybersecurity and Privacy Risks
    • Federal efforts to encourage IoT Security


Jane Davidson, Associate Attorney, Tucker Ellis LLP
Andrea D’Ambra, Partner, Norton Rose Fulbright US LLP

10:30am – 10:45am
Coffee Break

10:45am – 11:45am
Session 3: Data Security and Privacy Litigation

  • Class Actions’ Viability — Injury (Standing)
    • The Spokeo Effect— 2017 appellate decisions, e.g.:
      • Attias v. CareFirst (D.C. Cir.)
      • Katz v. The Donna Karan Co. (2dCir.)
      • Kuhns v. Scottrade
      • Robins v. Spokeo on remand (9th Cir.)
  • New causes of action and theories of recovery
  • Data breach litigation in a small claims court
  • BIPA-Biometric Information Privacy Act
  • Am I covered? Insurance coverage and related litigation
    • Engl v. Natural Grocers
    • Equifax


Frank Nolan, Counsel, Eversheds Sutherland
Tom Peistrup, General Counsel, Instyler
Howard Miller, Senior Vice President, Director, Tech Secure Division, LBW Insurance

11:45am – 12:45pm
Networking Luncheon

12:45pm- 1:45pm
Session 4: Fighting the Cyber War: Corporate Governance, People and Process

  • Where are you today? Where do you want/need to be?
  • Extracting Lessons Learned from 2019 Security Incidents
  • Proactive Risk Assessments – Prioritizing Your Security Controls
    • Risk appetite
    • “mining the dark web”
  • Cloud Migration Mishaps
    • Cloud Provider vd. MSSP Strategy
  • Due Diligence in Deals
  • Creating a Security Culture
    • workforce enablement, device security, BYOD, etc.
  • Are structured to respond?
    • Building and implementing a comprehensive response plan
  • Board responsibility for cyber
    • Capitol One class action settlement
  • Enforcing best practices for corrective actions
  • Considering Insider Threat
  • Maintaining privilege when investigating internal issues
  • Impact of failure
    • Loss of customer confidence, market share, and valuation


Bill Hardin, Vice President, Charles River Associates
Bryan Hurd, Vice President, Head of Office, Seattle, Stroz Friedberg
Erik Rasmussen, Principal, Head of CyberSecurity and Risk Management Solutions, Grobstein Teeple LLP
Scott Carlson, Partner, Seyfarth Shaw
Richard Lutkus, Partner, Seyfarth Shaw LLP
Boyd Clewis, Senior Security Consultant, Online Business Systems

1:45pm – 2:45pm
Session 5: Managing the Supply Chain

  • U.S. Government efforts to secure DoD supply chains
  • CMMC, NIST 800-171 updates, DCMA audits
  • Crypto-currencies
    • What are they?
    • Who regulates them or rather who doesn’t?
    • The KYC (know your client) rule with cryptocurrencies
    • Why companies need to care
  • Blockchain
    • The in’s and out’s
    • The different flavors of Blockchain
      • Public (Ethereum) vs. Private (Quorum)
        • Which fits your case?

Frank Nolan, Counsel, Eversheds Sutherland
Tom Peistrup, General Counsel, Instyler

2:45pm – 3:00pm
Networking Break

3:00pm – 4:00pm
Session 6: The Weapons of Cyber War

  • Defining your cyber-borders
  • Training your troops
  • Perimeter Defenses – Secure your employees where they are
  • User-based rules
  • Defense in Depth
  • Security by Design
  • Monitoring and threat detection
    • “I didn’t know” is no longer acceptable
  • Actionable Intelligence: Need for Trusted Processes and Workflows (Automation and Orchestration)
  • Pen-testing


Richard Lutkus, Partner, Seyfarth Shaw LLP
Bryan Hurd, Vice President, Head of Office, Seattle, Stroz Friedberg

4:00pm – 5:00pm
Session 7: Ethics in Cybersecurity

  • Threat landscape for law firms
  • Ethical obligations of law firms to protect client data (and understand technology)
  • How are companies scrutinizing and managing law firms?
  • What do you require of opposing counsel and other third parties when turning over information?
  • What assurances do we have from the government with sensitive info?
  • Ethical obligations when advising client on how to handle cybersecurity-related legal issues
  • Balancing legal preservation obligations with real word operational concerns


Scott Carlson, Partner, Seyfarth Shaw
John Breen, Partner, Lewis Brisbois

5:00pm – 6:00pm
Networking Reception


Agenda is subject to change.


Do NOT follow this link or you will be banned from the site!