Hyperthreats Alert – Risk Management in 2012
Risk Management continues to be among the most critical business functions. In 2012, “Hyperthreats” as simple as a stolen laptop or a negative posting on a social media site can bring down an entire organization quite literally overnight. If you have been sleeping on this issue, time to wake up. You cannot afford to miss this LIVE webcast. In addition to laying out an effective Risk Management strategy this course will discuss the most critical risk “Hyperthreats” affecting companies in 2012 such as:
- The Stolen Laptop & Data Time Bombs
- Atomic Social Media Posts
- Hackers & Cyber Attacks
- Data Protection & Integrity
- Sanctions – Doing business with Iran? You may not even know it!
- Avoiding Frivolous Lawsuits: Internal & External
- Threats from within – Rogue Employees
- Up-to-the-minute regulatory updates
The group will present their expert opinion in a two-hour LIVE webcast scheduled for: September 12, 2012.
Jenny Menna, Acting Director, U.S.-Computer Emergency Readiness Team (US-CERT),
U.S. Department of Homeland Security’s National Cyber Security Division (NCSD)
- The current cyber threat landscape
- What companies can do to prevent or mitigate a cyber attack
- What to do if you do find yourself a victim of a cyber attack
- What DHS is doing in cyber security to help you
Jason Straight, Esq., CIPP, Managing Director,
Kroll Advisory Solutions
- Evolving nature of cyber threats (from smash and grab to infiltrate and stay)
- Best practices approach to data breach incident response
- Ensuring that legal and technical resources stay in sync during a breach response
- Recovering and employing lessons learned
Martha Lessman Katz , Member,
Gordon Feinblatt LLC
- Privacy, Data Security Legal Environment/Enterprise Data Protection & the Law
- Where are the threats to the Enterprise
- Cloud Computing
- Application Security
- Managing Third Party Risk – Service Providers/Business process outsourcing
- Mobile Devices
- Security Operations – Monitoring, Detection, Incident Response/Mediation
James D. McNairy, Partner,
Seyfarth Shaw LLP
- Who tend to be the greatest exploiters of cyber vulnerabilities: employees and business partners
- What is most often targeted: intellectual property (particularly trade secrets)
- Why trade secrets?
- The misappropriators’ electronic tools of choice
- Stories from the trenches
- Social Media
- Unique and evolving risks
- Best practices to mitigate risks
Who Should Attend:
- CFOs & the Finance team
- Finance Executives
- Chief Risk Officers
- Risk Managers
Ms. Menna is the Acting Director of the U.S. Computer Emergency Readiness Team and Director of the Critical Infrastructure Cyber Protection and Awareness Branch within the Department of Homeland Security (DHS). As Director, she leads DHS’s cybersecurity engagement with industry and state and local government. Her roles also include overseeing the control systems security, cyber exercise, cyber security evaluation, and outreach and awareness programs. These programs provide leadership, expertise and coordination to assess and mitigate risk to the nation’s critical cyber infrastructure. She was selected as a member of the Senior Executive Service in 2009. Ms. Menna also formerly served as the Deputy Director of the Infrastructure Partnerships branch in the Office of Infrastructure Protection. Prior to joining the Department of Homeland Security, Ms. Menna held a variety of leadership roles for a large systems integration firm. She received both her M.A. and B.A. from the University of Chicago.
Ms. Menna is the Acting Director of the U.S. Computer Emergency Readiness Team and Director of the Critical Infrastructure Cyber …
Jason Straight is managing director for Kroll Advisory Solutions. In this role, he provides extensive knowledge and expert guidance to attorneys, IT professionals, information security directors, compliance officers and risk management personnel, among others in the areas of information assurance, computer forensics, cyber investigations data breach response.Straight joined Kroll in 2002 as a legal consultant in Kroll’s legal technologies group, then served as a regional manager and later led Kroll Ontrack’s technology consulting and computer forensics practice. Alongside a team of specialized consultants, he provides clients with advice on digital investigations, data privacy protection, information security, best practices, tactical incident response and strategic data breach preparedness. He has been involved in or overseen dozens of complex engagements concerning alleged network intrusion incidents, intellectual property theft, theft or loss of customer or employee data and all manner of internal corporate investigations.
Jason Straight is managing director for Kroll Advisory Solutions. In this role, he provides extensive knowledge and expert guidance to …
Martha Lessman Katz advises domestic and international clients regarding privacy and data security matters including cross border transfers, licensing and related technology transactions, outsourcing, e-Commerce transactions, and emerging issues with social media. Martha also assists businesses in a wide spectrum of industries in the development, implementation and management of intellectual property asset strategies, helping them to manage the exploitation and commercialization of their intellectual property assets and all facets of technology transactions. Examples of such matters include: in and out licensing, technology transfer, subscription agreements, website legal terms, Software/Platform/Infrastructure as a Service and cloud computing agreements.Martha has been included in Best Lawyers in America, Information Technology Law each year since 2009. She is certified by the International Association of Privacy Professionals as an information privacy professional. She is also certified by the Licensing Executives Society as a licensing specialist.
Martha Lessman Katz advises domestic and international clients regarding privacy and data security matters including cross border transfers, licensing and …
Mr. McNairy is a partner in the Litigation Department of Seyfarth Shaw LLP. He specializes in matters involving trade secret, non-compete, computer fraud, unfair competition, and related business tort claims. He prosecutes and defends trade secret misappropriation claims, as well as efforts to enforce/invalidate restrictive covenants in employment-related agreements.Mr. McNairy is serving as a member of the Executive Committee of the State Bar of California’s Intellectual Property Law Section for the 2012-2015 term. He routinely writes and presents on trade secret, non-compete and computer fraud issues and is a contributing editor to the 2011 Supplement to Trade Secret Litigation and Protection in California, a widely referenced publication of the Intellectual Property Section of the State Bar of California.
Mr. McNairy is a partner in the Litigation Department of Seyfarth Shaw LLP. He specializes in matters involving trade secret, …
Print and review course materials
Method of Presentation:
On-demand Webcast (CLE)
Unlock All The Knowledge and Credit You Need
Leading Provider of Online Continuing Education
It's As Easy as 1, 2, 3
Get Your 1-Year All Access Pass For Only $199
U.S. Department of Homeland Security
About U.S. Department of Homeland Security
About Kroll Advisory Solutions
Kroll Advisory Solutions, the global leader in risk mitigation and response, delivers a wide range of solutions that span investigations, due diligence, compliance, cyber security and physical security. Clients partner with Kroll Advisory Solutions for the highest-value intelligence and insight to drive the most confident decisions about protecting their companies, assets and people.Kroll Advisory Solutions is recognized for its expertise, with 40 years of experience meeting the demands of dynamic businesses and their environments around the world. Headquartered in New York with offices in 29 cities across 17 countries, Kroll Advisory Solutions has a multidisciplinary team of 700 employees. For more information, visit:www.krolladvisorysolutions.com.
About Gordon Feinblatt LLC
Gordon Feinblatt LLC, established in 1953, is one of Maryland’s premier full-service law firms with 67 attorneys and 25 paralegals. Our size assures proficiency in virtually every area of the law without sacrificing personalized attention to our clients. Our attorneys provide a spectrum of legal services for businesses, institutions and individuals.Gordon Feinblatt anticipates and responds to the needs of our clients, ranging from emerging businesses to multinational companies. Our Intellectual Property & Technology Practice Group delivers comprehensive solutions to promote growth and resolve complex issues for businesses in various industries including biotech, energy, telecommunications, software development, electronics and e-commerce. Gordon Feinblatt provides a legal advantage to people doing business in Maryland.
About Seyfarth Shaw LLP
Seyfarth Shaw was founded by three lawyers in 1945 and has grown to more than 800 lawyers in the U.S. and in London. Seyfarth Shaw offers a national platform and an international gateway to serve clients’ changing business and legal needs in litigation, employment, corporate, real estate, intellectual property, and employee benefits.The Firm’s success is the result of a constant, unrelenting focus on the needs of clients, who are our partners in business and who we are committed to listening and responding to. The Firm’s SeyfarthLean initiative uses structured team-based collaboration, both internally and client facing, to deliver value. Seyfarth Shaw has pioneered in the law firm environment the use of Six Sigma and other business processes as tools to plan, organize and manage resources, and deliver results to the client.