Los Angeles - CA
Law Seminars International Presents:

An Advanced Seminar on What You Need to Know About

Cybersecurity Law and Solutions

Current legal standards, best practices, and practical tips

April 15, 2016

Los Angeles, CA
(or anyplace you may be via webcast!)

Intro

Who Should Order

Attorneys, business executives, government officials, and consultants involved with critical infrastructure and sensitive information needing protection from cyber attacks

Why You Should Order

Cybersecurity is an area where connecting the dots can be really challenging because the pieces are moving so rapidly. The technology for collecting, storing, and analyzing data are rapidly evolving, as are the business models for creating value from raw data. As data becomes more valuable, hackers are upgrading their game, both in terms of the technologies they use and the ways of exploiting their victims.

At the same time, consumers are becoming increasingly concerned about loss of privacy and anonymity as they go about their daily lives. Recent years have seen a proliferation of state, federal, and international regulations designed to address those concerns.

These issues are particularly timely, with the European Court of Justice striking down the Safe Harbor framework for cross-border data transfers in Schrems decision in October 2015, and President Obama signing the Cybersecurity Information Sharing Act (CISA) into law in December 2015, despite the protests of privacy advocates.

What to do? An effective defense strategy requires an understanding of both technological capabilities and the rapidly evolving legal landscape. The stakes are too high to go it alone, so it's also important to understand insurance options and what you will need to negotiate a cost-effective package that meets your needs. A legally defensible cybersecurity strategy requires an acute awareness of and respect for privacy laws and consumer expectations.

We have assembled a group of leading experts with deep experience in all aspects of cybersecurity planning and response to share updated information and their insights with you. Don't miss this opportunity for a stimulating and valuable discussion of current cybersecurity law and policy, risk management, and practical solutions.

~ Tanya Forsheit, Esq., Baker & Hostetler LLP and Jonathan Fairtlough, Esq., Kroll Associates, Inc., Program Co-Chairsz

What You Will Learn

  • New developments in California law on company responsibility for data privacy, data security, cyber extortion, and consumer protection
  • Data breaches as a growth area for class action suits
  • The FTC's privacy and data security with its intensely scrutinized recent consent decree in Wyndham
  • Practical tips for getting your house in order
  • Updating your incident response plan: Lessons from mistakes made after recent breaches
  • New era in law firm security and incident response for the latest in information-sharing and most significant threats to law firm client data

Agenda

Friday, April 15, 2016

8:00 am

Registration Opens

8:30 am

Introduction and Overview - (Session # 1)

Jonathan P. Fairtlough, Esq. , Program Co-Chair, Managing Director, Cyber Security & Investigations
Kroll Associates, Inc. / Los Angeles, CA

Tanya L. Forsheit, Esq. , Program Co-Chair
Baker & Hostetler LLP / Los Angeles, CA

8:45 am

New Developments in California Law

Company responsibility for data privacy, data security, cyber extortion, and consumer protection

Tanya L. Forsheit, Esq. , Program Co-Chair
Baker & Hostetler LLP / Los Angeles, CA

9:30 am

National Civil Litigation Trends: Data Breaches as a Growth Area for Class Action Suits

Lessons from recent breach cases on standards of care (including the relevance of NIST Cyber Security Framework compliance); special issues arising under California's Section 17200 unfair competition and false advertising laws

Valerie Meiling Goo, Esq.
Orrick Herrington & Sutcliffe LLP / Los Angeles, CA

10:15 am

Break

10:30 am

The FTC as an Active Player and the New Role of the FCC - (Session # 2)

The FTC as an active player in privacy and data security with its intensely scrutinized recent consent decree in Wyndham; the emerging role for the Federal Communications Commission (FCC) and how it will impact the FTC's role

Thomas Dahdouh , Western Regional Director
Federal Trade Commission / San Francisco, CA

11:15 am

Cyber/data Security and Cyber Crimes

Enforcement priorities. How companies can work with law enforcement to prevent a breach, what to do in the event of such, and current trends in cyber crime

Tracy L. Wilkison, Esq. , Assistant U.S. Attorney
U.S. Attorney's Office / Los Angeles, CA

12:00 pm

Lunch (on your own)

1:15 pm

Practical Tips for Getting Your House in Order - (Session # 3)

Customers: Preparing for cybersecurity demands (i.e. email encryption); finding win-win solutions that protect the customer while avoiding undue financial burdens; tips for maintaining future operational flexibility

Andreas T. Kaltsounis, Esq. , Vice President
Stroz Friedberg LLC / Seattle, WA

Identifying current best practices and industry standards for vulnerability and penetration-testing programs, from establishing what needs to be done through ongoing intrusion detection testing

Erik Rasmussen, Esq. , Associate Managing Director
Kroll Associates, Inc. / Los Angeles, CA

An insurer's perspective on operational structures that unnecessarily increase your exposure

Paul G. Nikhinson, Esq. , Privacy Breach Response Services Manager
Beazley Group / San Francisco, CA

Supplier: The world of cyber-attack continues to evolve. How will Europe's new Network and Information Secuirty Directive and General Data Protection Regulation impact your vulnerability management programs

Mark Webber, Esq. , Registered Foreign Legal Consultant
Fieldfisher LLP / East Palo Alto, CA

3:15 pm

Break

3:30 pm

Updating Your Incident Response Plan: Lessons from Mistakes Made After Recent Breaches - (Session # 4)

Communications with the press and your customers during the critical first 48 hours

Samantha Kruse , Account Supervisor
LEVICK / Washington, DC

Lessons from recent cases on what makes sense to do in house and what you want to have done by outside counsel with preservation of attorney-client privilege in mind

M. Scott Koller, Esq. , CISSP, CCFE, CIPP
Baker & Hostetler LLP / Los Angeles, CA

4:30 pm

Wrap Up Case Study: How to Protect Your Law Firm or Legal Department

Law firms also under scrutiny for information security: New era in law firm security and incident response for the latest in information-sharing and most significant threats to law firm client data

Daniel B. Garrie, Esq. , Executive Managing Partner
Law & Forensics LLC / Seattle, WA

5:00 pm

Evaluations & Adjourn

Faculty Bios

Jonathan P. Fairtlough , Managing Director and head of the Kroll Associates, Inc. Los Angeles office. Formerly he was a prosecutor at the Los Angeles County District Attorney's Office. He leads teams that provide comprehensive investigative services for digital forensics, data breach response and cyber-crimes.

Tanya L. Forsheit , partner, Baker & Hostetler LLP, works with clients to address legal requirements and best practices for protection of customer and employee information. She advises organizations across disciplines in compliance, transactions, and litigation matters involving the use, sharing, and protection of sensitive information.

Thomas Dahdouh , is Regional Director of the Federal Trade Commission's Western Region. Previously, he was a staff attorney in the San Francisco office, handling both consumer protection and antitrust matters.

Daniel B. Garrie , is Executive Managing Partner, Law & Forensics LLC, and a global leader in electronic discovery and computer forensics and an e-discovery special master, forensic neutral, and expert witness for complex and contested disputes. He has authored several treatises including the book "A Guide for Judges: Understanding Software, the Internet, Mobile Computing, and the Cloud" published by the Federal Judicial Center.

Valerie Goo, a part ner in Orrick Herrington & Sutcliffe LLP, Los Angeles, is a trial lawyer with a focus on intellectual property and complex commercial litigation.

Andreas T. Kaltsounis , Vice President, Stroz Friedberg, draws upon his investigative experience as a former state and federal law enforcement officer, his expertise in computer forensics and technology, and his legal experience to manage engagements relating to data breaches and cybercrimes, network and data security, internal investigations, and digital forensics.

M. Scott Koller , CISSP, CCFE, CIPP, counsel, Baker & Hostetler LLP, focuses on information technology, privacy, and data security, data breach response and compliance issues, including complex litigation, and is experienced with e-discovery issues.

Samantha Kruse , Account Supervisor, is a crisis counselor with LEVICK, for active breach incidents or pre-incident scenario planning, including health care and finance. She has developed and managed both local, national and international reputation management campaigns for clients in the legal, energy, insurance, real estate, agriculture, and professional sports industries.

Paul G. Nikhinson , is Data Breach Response Services Manager, Beazley Group, the pioneer and market leader in data breach response insurance. He supports insureds, focusing on network security attacks against retail, healthcare, higher education, and financial institution clients.

Erik Rasmussen , is Associate Managing Director, Cyber Investigations Practice, Kroll Associates, Inc. Previously, he was Director of North America Cyber Intelligence for Payment System Risk at Visa Inc., where he managed external cyber intelligence and cyber investigative matters as it related to merchant data compromises, point of sale (POS) attacks and other aspects of threat intelligence impacting the payment ecosystem.

Mark Webber , partner & Registered Foreign Legal Consultant, Field Fisher Waterhouse (Silicon Valley) LLP, focuses on international technology and internet law and is a leading contract and regulatory specialist in EU based technology transactions, particularly those with a disruptive component. He advises where cloud, digital and online technologies converge and leverages IP and/or data in order to add value.

Tracy L. Wilkison , Assistant U.S. Attorney, Chief, Cyber and Intellectual Property Crimes Section within the National Security Division of the U.S. Attorney's Office in Los Angeles, prosecutes federal cyber crimes arising from computer hacking, internet fraud, identity theft, child pornography, cyber stalking, Internet piracy, theft of trade secrets, and the sale of counterfeited trademarked or copyrighted goods.

Credits

Continuing Education Credits

Live credits: Law Seminars International is a State Bar of California approved MCLE provider. This program qualifies for 6.75 California CLE credits and 6.5 Washington CLE credits (pending). Upon request, we will apply for, or help you apply for, CLE credits in other states and other types of credits.

Webcast Options

Video Replays allow you to time-shift your content. The Vodcast has navigation tools and search capabilities that allow you to quickly find the portions most important to you. It allows you to plug a flashdrive into your laptop and make effective use of in-flight plane time.

Audio Podcasts are perfect for making more effective use of the time you spend commuting.

Screenshots

Webcast Screenshot

Webcast Presentation Focus

Webcast Screenshot

Webcast Speaker Focus

Ordering