University of Texas School of Law

eConference

2018 Essential Cybersecurity Law eConference (Aug 2018)

Technical Questions?
512.475.6700
service@utcle.org
System Test
Cyber intrusions—data breaches, hacking, ransomware, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key phases and legal issues relating to breach preparedness and response. Hear directly from top government officials, get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach.
Preview mode. You must be signed in and have
purchased this eConference to have full access.

Total Credit Hours:
8.00 | 1.50 ethics     Credit Info
Specialization: Administrative Law | Civil Appellate Law | Civil Trial Law | Criminal Appellate Law | Criminal Law

TX MCLE credit expires: 8/31/2019

Includes: Video Audio Paper Slides

$325  

Preview Sessions
Credit Hours
1. Civil Litigation and Regulatory Update (Aug 2018)

Mark L. Krotoski

0.75 0.00 0.00 0.75  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 50 mins
Audio (mp3) 50 mins
Paper (pdf) 13 pgs
Slides (pdf) 41 pgs

SESSION 1 — 50 mins, credit 0.75

Session 1:

Civil Litigation and Regulatory Update (Aug 2018)

Review recent developments in U.S. data breach and cyber class action litigation, as well as in new and emerging enforcement standards at the federal and state level, including the SEC Guidance On Cybersecurity Disclosures.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Mark L. Krotoski, Morgan, Lewis & Bockius LLP - Palo Alto, CA

2. The GDPR: Insights from Years of Preparation and Two Months of Enforcement (Aug 2018)

Daniel J. Felz

0.75 0.00 0.00 0.75  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 47 mins
Video (mp4) 47 mins
Audio (mp3) 47 mins
Slides (pdf) 21 pgs

SESSION 2 — 47 mins, credit 0.75

Session 2:

The GDPR: Insights from Years of Preparation and Two Months of Enforcement (Aug 2018)

The EU passed the General Data Protection Regulation (GDPR) in 2016 and, after a two-year grace period, the GDPR entered into force on May 25, 2018. Hear insights on the areas where companies continue to focus their time, resources, and concern following the GDPR’s entry into force. In addition, hear first-hand experience from an attorney who spent the first two months following the GDPR’s “go-live” date in Brussels, including meeting European privacy authorities, to provide updates on the first wave of GDPR enforcement.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Daniel J. Felz, Alston & Bird LLP - Dallas, TX and Brussels, Belgium

3. Internal Controls and Compliance (Aug 2018)

Shawn A. Morgan, Monté L. Williams

1.00 0.00 0.00 1.00  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 61 mins
Audio (mp3) 61 mins
Slides (pdf) 33 pgs

SESSION 3 — 61 mins, credit 1.00

Session 3:

Internal Controls and Compliance (Aug 2018)

Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Shawn A. Morgan, Steptoe & Johnson PLLC - Bridgeport, WV
Monté L. Williams, Steptoe & Johnson PLLC - Morgantown, WV

4. Emerging Issues with Ephemeral Data and Messaging Applications (Aug 2018)

Benjamin G. Goodman, Thom Wisinski

0.50 0.00 0.00 0.50  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 30 mins
Audio (mp3) 30 mins
Slides (pdf) 7 pgs

SESSION 4 — 30 mins, credit 0.50

Session 4:

Emerging Issues with Ephemeral Data and Messaging Applications (Aug 2018)

From corporate executives to contract employees, the use of ephemeral data and messaging applications to discuss company business increases daily. Hear an overview of what you need to know about this emerging technology—including how disappearing data works, options for preserving it (when necessary), how to implement and configure ephemeral applications for corporate use, and the benefits and risks associated with the technology (including the implications for document retention, document preservation, and discovery obligations).

Originally presented at: Jul 2018 Essential Cybersecurity Law

Benjamin G. Goodman, Haynes and Boone, LLP - Dallas, TX
Thom Wisinski, Haynes and Boone, LLP - Dallas, TX

5. Blockchain: From Cryptocurrencies to Solving Your Practice's Most Common Inefficiencies (Aug 2018)

Lacey Shrum

0.75 0.00 0.00 0.75  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 42 mins
Audio (mp3) 42 mins
Slides (pdf) 8 pgs

SESSION 5 — 42 mins, credit 0.75

Session 5:

Blockchain: From Cryptocurrencies to Solving Your Practice's Most Common Inefficiencies (Aug 2018)

Understand the various ways blockchain technology is used, including smart contracts, document management, and protection of data.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Lacey Shrum, H7 Consulting, LLC - Dallas, TX

6. Cybersecurity Regulation and Enforcement (Aug 2018)

Richard J. Johnson, Michael Chu, James E. Elliott, Scott Mascianica

1.00 0.50 0.00 1.00 | 0.50 ethics  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 61 mins
Audio (mp3) 61 mins
Paper (pdf) 34 pgs
Slides (pdf) 3 pgs

SESSION 6 — 61 mins, credit 1.00 | 0.50 ethics

Session 6:

Cybersecurity Regulation and Enforcement (Aug 2018)

Discuss cybersecurity regulation and enforcement, understand current threats, and explore‎ best practices to address the threats and manage legal liability. 

Originally presented at: Jul 2018 Essential Cybersecurity Law

Richard J. Johnson, Jones Day - Dallas, TX
Michael Chu, U.S. Department of Justice - Houston, TX
James E. Elliott, Federal Trade Commission - Dallas, TX
Scott Mascianica, U.S. Securities and Exchange Commission - Fort Worth, TX

7. Incident Response and Breach Disclosure (Aug 2018)

Lynn Sessions, Thomas Arnold, Nick Bludworth, William R. Daugherty

1.25 0.50 0.00 1.25 | 0.50 ethics  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 80 mins
Audio (mp3) 79 mins
Slides (pdf) 9 pgs

SESSION 7 — 80 mins, credit 1.25 | 0.50 ethics

Session 7:

Incident Response and Breach Disclosure (Aug 2018)

Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Lynn Sessions, Baker & Hostetler LLP - Houston, TX
Thomas Arnold, Mandiant - Houston, TX
Nick Bludworth, Federal Bureau of Investigation - Houston, TX
William R. Daugherty, Baker & Hostetler LLP - Houston, TX

8. Cybersecurity Insurance (Aug 2018)

Dominic Keller, Leslie C. Thorne

0.50 0.00 0.00 0.50  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 35 mins
Audio (mp3) 35 mins
Slides (pdf) 9 pgs

SESSION 8 — 35 mins, credit 0.50

Session 8:

Cybersecurity Insurance (Aug 2018)

Examine key insurance provisions and hear thoughts on evolving exposures impacting privacy and cyber insurance.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Dominic Keller, Willis Towers Watson - San Francisco, CA
Leslie C. Thorne, Haynes and Boone, LLP - Austin, TX

9. Third-Party Vendor Risk Management (Aug 2018)

Elizabeth C. Rogers

0.50 0.00 0.00 0.50  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 37 mins
Audio (mp3) 37 mins
Slides (pdf) 17 pgs

SESSION 9 — 37 mins, credit 0.50

Session 9:

Third-Party Vendor Risk Management (Aug 2018)

Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Elizabeth C. Rogers, Michael Best & Friedrich LLP - Austin, TX

10. In-House Panel (Aug 2018)

Emily Westridge Black, Ann Ahrens Beck, Robert L. Levy, Brian Mork

1.00 0.50 0.00 1.00 | 0.50 ethics  

Preview Session Materials

You may download session materials
for offline use.

Video (mp4) 66 mins
Audio (mp3) 66 mins
Slides (pdf) 5 pgs

SESSION 10 — 66 mins, credit 1.00 | 0.50 ethics

Session 10:

In-House Panel (Aug 2018)

Hear from a panel of in-house counsel on the latest challenges and solutions in confronting cyber threats.

Originally presented at: Jul 2018 Essential Cybersecurity Law

Emily Westridge Black, Haynes and Boone, LLP - Austin, TX
Ann Ahrens Beck, AT&T - Dallas, TX
Robert L. Levy, Exxon Mobil Corporation - Houston, TX
Brian Mork, Celanese Corporation - Dallas, TX