- Lawyers and Bankers Win, DOJ and Shareholders LosePosted 2 hours ago
- Ruling Takes Big Weapon Away From New York AGPosted 3 days ago
- Seattle Repeals Tax After Amazon Lobbying BlitzPosted 3 days ago
- No Privilege For GC In Bizarre Coverage DisputePosted 4 days ago
- Turning E-Discovery Concepts Into PracticePosted 4 days ago
- Search Engine Optimization For Law FirmsPosted 6 days ago
San Francisco Agenda
The 2019 agenda is coming soon.
A copy of the 2018 agenda is below.
8:30am – 9:00am
Continental Breakfast and Registration
9:00am – 9:10am
Welcome and Opening Remarks
9:10am – 9:30am
Session 1: Polling the Audience
- What is your data security role at your organization?
- What are your pain points, biggest issues?
- What do you want to get out of the seminar?
9:30am – 10:30am
Session 2: GDPR The New Cyber – Horizons in 2018
- Implementation of the E.U. General Data Protection Regulations in May 2018
- How it applies to U.S companies
- What is Informed Consent under the GDPR?
- Sanctions and Fines
- IoT Devices
- Unique Cybersecurity and Privacy Risks
- Federal efforts to encourage IoT Security
- DDoS Attacks
- Privacy Shield
10:30am – 11:00am
11:00am – 12:00pm
Session 3: Data Security and Privacy Litigation
- Class Actions’ Viability — Injury (Standing)
- The Spokeo Effect— 2017 appellate decisions, e.g.:
- Attias v. CareFirst (D.C. Cir.)
- Katz v. The Donna Karan Co. (2dCir.)
- Kuhns v. Scottrade
- Robins v. Spokeo on remand (9th Cir.)
- New causes of action and theories of recovery
- Am I covered? Insurance litigation
- Engl v. Natural Grocers
12:00pm – 1:00pm
Session 4: Fighting the Cyber War: Corporate Governance, People and Process
- Where are you today?Where do you want/need to be?
- Extracting Lessons Learned from 2017 Security Incidents
- Proactive Risk Assessments – Prioritizing Your Security Controls
- Risk appetite
- “mining the dark web”
- Cloud Migration Mishaps
- Due Diligence in Deals
- Creating a Security Culture
- Are structured to respond?
- Building and implementing a comprehensive response plan
- Board responsibility for cyber
- Enforcing best practices for corrective actions
- Considering Insider Threat
- Impact of failure
- Loss of customer confidence, market share, and valuation
2:00pm – 3:00pm
Session 5: The Dark Side of Digitalization
- Cybercriminals, recent arrests, and the impact on the threat landscape
- International cooperation
- Geolocation challenges
- Anomaly Detection: Breaking the code of Zero Days
- Vulnerability programs – what are they and when can you white hat hack
3:00pm – 3:30pm
3:30pm – 4:30pm
Session 6: Understanding Cryptocurrencies and Blockchain
- What are they?
- Why companies need to care
- The in’s and out’s
4:30pm – 5:30pm
8:30am – 9:00am
9:00am – 10:00am
Session 7: The Weapons of Cyber War
- Defining your cyber-borders
- Training your troops
- Perimeter Defenses – Secure your employees where they are
- User-based rules
- Defense in Depth
- Security by Design
- Monitoring and threat detection
- “I didn’t know” is no longer acceptable
- Actionable Intelligence: Need for Trusted Processes and Workflows (Automation and Orchestration)
10:00am – 11:00am
Session 8: Recent Attacks and the Aftermath
- Fedex, Reckitt Benckiser and Hollywood Presbyterian ransomware attacks
- FDA guidance on protecting medical devices against cybersecurity attacks
- Recent hack of Tesla Model S
- D-Link internet camera vulnerabilities
11:00am – 11:30am
11:30am – 12:30pm
Session 9: Ethics in Cybersecurity
- Threat landscape for law firms
- Ethical obligations of law firms to protect client data (and understand technology)
- How are companies (especially in regulated industries) scrutinizing and managing law firms?
- What do you require of opposing counsel and other third parties when turning over information?
- What assurances do we have from the government with sensitive info?
- Ethical obligations when advising client on how to handle cybersecurity-related legal issues
- Balancing legal preservation obligations with real word operational concerns
Agenda is subject to change.