eConference

2018 Essential Cybersecurity Law eConference

Contains material from Aug 2018

2018 Essential Cybersecurity Law eConference
4.24 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

Great Course - very informative.

Difficult accessing the online version and claiming credits. ~gh

I was unable to download the files to my MAC. Accordingly, I'm just going to rate them as poor.

Very beneficial conference! I look forward to attending again later this year. My one suggestion would be to provide more detailed papers with the presentations and not just slides.

Good presentations and support materials.

it was fine

N/A

Very interesting for a non cyber lawyer... assuming any of those remain.

Technical Questions?
512.475.6700
service@utcle.org



Cyber intrusions—data breaches, hacking, ransomware, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key phases and legal issues relating to breach preparedness and response. Hear directly from top government officials, get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach.

Includes: Video Audio Paper Slides


Preview mode. You must be signed in, have purchased this eConference, and the eConference must be active to have full access.
Preview Sessions

1. Civil Litigation and Regulatory Update (Aug 2018)

Mark L. Krotoski

0.75 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
50 mins
(mp3)
50 mins
(pdf)
13 pgs
(pdf)
41 pgs
Session 1 —50 mins
Civil Litigation and Regulatory Update (Aug 2018)

Review recent developments in U.S. data breach and cyber class action litigation, as well as in new and emerging enforcement standards at the federal and state level, including the SEC Guidance On Cybersecurity Disclosures.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Mark L. Krotoski, Morgan, Lewis & Bockius LLP - Palo Alto, CA

2. The GDPR: Insights from Years of Preparation and Two Months of Enforcement (Aug 2018)

Daniel J. Felz

0.75 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
47 mins
(mp4)
47 mins
(mp3)
47 mins
(pdf)
21 pgs
Session 2 —47 mins
The GDPR: Insights from Years of Preparation and Two Months of Enforcement (Aug 2018)

The EU passed the General Data Protection Regulation (GDPR) in 2016 and, after a two-year grace period, the GDPR entered into force on May 25, 2018. Hear insights on the areas where companies continue to focus their time, resources, and concern following the GDPR’s entry into force. In addition, hear first-hand experience from an attorney who spent the first two months following the GDPR’s “go-live” date in Brussels, including meeting European privacy authorities, to provide updates on the first wave of GDPR enforcement.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Daniel J. Felz, Alston & Bird LLP - Dallas, TX and Brussels, Belgium

3. Internal Controls and Compliance (Aug 2018)

Shawn A. Morgan, Monté L. Williams

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
61 mins
(mp3)
61 mins
(pdf)
33 pgs
Session 3 —61 mins
Internal Controls and Compliance (Aug 2018)

Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Shawn A. Morgan, Steptoe & Johnson PLLC - Bridgeport, WV
Monté L. Williams, Steptoe & Johnson PLLC - Morgantown, WV

4. Emerging Issues with Ephemeral Data and Messaging Applications (Aug 2018)

Benjamin G. Goodman, Thom Wisinski

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
30 mins
(mp3)
30 mins
(pdf)
7 pgs
Session 4 —30 mins
Emerging Issues with Ephemeral Data and Messaging Applications (Aug 2018)

From corporate executives to contract employees, the use of ephemeral data and messaging applications to discuss company business increases daily. Hear an overview of what you need to know about this emerging technology—including how disappearing data works, options for preserving it (when necessary), how to implement and configure ephemeral applications for corporate use, and the benefits and risks associated with the technology (including the implications for document retention, document preservation, and discovery obligations).

Originally presented at: Jul 2018 Essential Cybersecurity Law

Benjamin G. Goodman, Haynes and Boone, LLP - Dallas, TX
Thom Wisinski, Haynes and Boone, LLP - Dallas, TX

5. Blockchain: From Cryptocurrencies to Solving Your Practice's Most Common Inefficiencies (Aug 2018)

Lacey Shrum

0.75 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
42 mins
(mp3)
42 mins
(pdf)
8 pgs
Session 5 —42 mins
Blockchain: From Cryptocurrencies to Solving Your Practice's Most Common Inefficiencies (Aug 2018)

Understand the various ways blockchain technology is used, including smart contracts, document management, and protection of data.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Lacey Shrum, H7 Consulting, LLC - Dallas, TX

6. Cybersecurity Regulation and Enforcement (Aug 2018)

Richard J. Johnson, Michael Chu, James E. Elliott, Scott Mascianica

1.00 0.50 0.00
Preview Materials

Download session materials for offline use

(mp4)
61 mins
(mp3)
61 mins
(pdf)
34 pgs
Slides
(pdf)
3 pgs
Session 6 —61 mins
Cybersecurity Regulation and Enforcement (Aug 2018)

Discuss cybersecurity regulation and enforcement, understand current threats, and explore‎ best practices to address the threats and manage legal liability. 

Originally presented at: Jul 2018 Essential Cybersecurity Law

Richard J. Johnson, Jones Day - Dallas, TX
Michael Chu, U.S. Department of Justice - Houston, TX
James E. Elliott, Federal Trade Commission - Dallas, TX
Scott Mascianica, U.S. Securities and Exchange Commission - Fort Worth, TX

7. Incident Response and Breach Disclosure (Aug 2018)

Lynn Sessions, Thomas Arnold, Nick Bludworth, William R. Daugherty

1.25 0.50 0.00
Preview Materials

Download session materials for offline use

(mp4)
80 mins
(mp3)
79 mins
(pdf)
9 pgs
Session 7 —80 mins
Incident Response and Breach Disclosure (Aug 2018)

Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Lynn Sessions, Baker & Hostetler LLP - Houston, TX
Thomas Arnold, Mandiant - Houston, TX
Nick Bludworth, Federal Bureau of Investigation - Houston, TX
William R. Daugherty, Baker & Hostetler LLP - Houston, TX

8. Cybersecurity Insurance (Aug 2018)

Dominic Keller, Leslie C. Thorne

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
35 mins
(mp3)
35 mins
(pdf)
9 pgs
Session 8 —35 mins
Cybersecurity Insurance (Aug 2018)

Examine key insurance provisions and hear thoughts on evolving exposures impacting privacy and cyber insurance.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Dominic Keller, Willis Towers Watson - San Francisco, CA
Leslie C. Thorne, Haynes and Boone, LLP - Austin, TX

9. Third-Party Vendor Risk Management (Aug 2018)

Elizabeth C. Rogers

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
37 mins
(mp3)
37 mins
(pdf)
17 pgs
Session 9 —37 mins
Third-Party Vendor Risk Management (Aug 2018)

Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Elizabeth C. Rogers, Michael Best & Friedrich LLP - Austin, TX

10. In-House Panel (Aug 2018)

Emily Westridge Black, Ann Ahrens Beck, Robert L. Levy, Brian Mork

1.00 0.50 0.00
Preview Materials

Download session materials for offline use

(mp4)
66 mins
(mp3)
66 mins
Slides
(pdf)
5 pgs
Session 10 —66 mins
In-House Panel (Aug 2018)

Hear from a panel of in-house counsel on the latest challenges and solutions in confronting cyber threats.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Emily Westridge Black, Haynes and Boone, LLP - Austin, TX
Ann Ahrens Beck, AT&T - Dallas, TX
Robert L. Levy, Exxon Mobil Corporation - Houston, TX
Brian Mork, Celanese Corporation - Dallas, TX

Sign-Up for Our Hooked on CLE Monthly Newsletter