2017 Cybersecurity and Privacy Protection Conference Schedule

print thisprint this

Schedule and Panel Topics

Register HereApril 27 & 28, 2017
12 hours CLE Credit
11.75 hours IAPP CPE Credit

Thursday, April 27

7:00-8:00 am

Registration and Networking Breakfast

8:00-8:15 am

Welcome and Introductions

Lee Fisher, Interim Dean, Cleveland-Marshall College of Law

Brian Ray, Professor and Co-Director Center for Cybersecurity and Privacy Protection, Cleveland-Marshall College of Law

8:15-9:30 am

Opening Keynote and Q&A

Maureen K. Ohlhausen, FTC Acting Chairman

9:30-9:45 AM

Networking Break

 

Watch Video: Apr 27, Part 1 - 8:00am - 9:30am 


9:45-11:00 AM

Surveying the Regulatory Landscape

Kevin Bocek, Vice President, Security Strategy and Threat Intelligence, Venafi, Inc.

Frances Floriano Goins, Co-Chair, Data Privacy and Information Security, and Co-Chair, Financial Services & Securities Litigation, Ulmer and Berne LLP

Andrew Kruley, Deputy Regional Manager, U.S. Department of Health and Human Services, Office for Civil Rights

Kevin D. Rosen, Senior Partner, Shutts and Bowen

Michael D. Stovsky, Partner; Chair, Innovations, Information Technology & Intellectual Property (3iP) Practice Group, Benesch

Brian Ray, Professor and Co-Director Center for Cybersecurity and Privacy Protection, Cleveland-Marshall College of Law (moderator)

Cybersecurity and privacy are the subject of a complex array of overlapping, and at times conflicting, regulatory requirements at the state, national, and international levels. This panel of expert advisors, current and former regulators, and industry veterans will survey the major regulatory regimes, emerging issues in those regimes, and best practices and resources for compliance.

11:00 AM-12:00 PM

Moving from Compliance to Prevention    

Joseph Compton, Principal, Skoda Minotti

Robert W. Eckman, Chief Information Security Officer, MCPc

Paul Hugenberg, CEO, InfoGPS Networks

Spence Witten, Director of Federal Sales, LunarLine

Developing cybersecurity and privacy policies and procedures to comply with applicable regulations is only the first step in securing your data and preventing a breach. This panel will discuss emerging technologies and best practices that can enable organizations to move beyond mere compliance towards a robust and resilient cybersecurity posture.

12:00 - 12:45 PM

Networking Lunch
Sponsored by Benesch

 

Watch Video: Apr 27, Part 2 - 9:45am - 12:00pm


12:45-1:45 PM

Cybersecurity Policy in the Trump Administration

Carrie Cordero, Counsel, ZwillGen PLLC

Gregory T. Garcia, Executive Vice President, Signal Group

Daniel (DJ) Rosenthal,  Associate Managing Director Investigations & Disputes, North America, Kroll

Brian Tishuk, Executive Director, Financial Services Sector Coordinating Council

From the Russian hack of DNC servers to the roll-back of FCC privacy rules, cybersecurity and privacy issues already have played a significant role in the Trump Administration. A panel of political veterans will discuss these and other key developments in cybersecurity and privacy policy under the new administration.

1:45-2:45 PM

Third-Party Vendor Management

Joseph A. Dickinson, Counsel, Tucker Ellis LLP

Christopher Dorr, Third-Party Risk Management, Pivot Point Security

Jordan McQuown, CIO, Information Security, LogicForce

Matt Hallock, National Sales Executive, Expedient

Thomas F. Zych, Partner; Chair, Emerging Technologies Practice, Thompson Hine

Several high-profile data breaches began with security breaches at a third-party. Cyber criminals increasingly target vendors and other service providers, including law firms, to gain access to their clients. Managing third-party risk is an important component of any data security program. Most regulatory regimes require specific steps to address third-party security and many impose specific requirements on service providers and vendors themselves. This panel will examine those requirements and best practices for managing those risks.

2:45-3:15 PM

Networking Break
Sponsored by Tucker Ellis LLP

 

Watch Video: Apr 27, Part 3 - 12:45pm - 2:45pm


3:15-4:30 PM

State and Regional Collaborations

Jeff Brancato, Northeast Ohio CyberConsortium; Principal, Brancato Solutions, LLC

Kevin J. Goodman, Business Development, Sales and Marketing, Bluebridge Networks, LLC

Jeff Schmidt, Vice President, Chief Cyber Security Innovator, Columbus Collaboratory

Craig Rapp, Deputy General Counsel, Ohio Attorney General

Several exciting new cybersecurity-related collaborations and initiatives have emerged in Ohio over the past several years, including the Columbus Collaboratory, the NortheastOhio CyberConsortium and the Ohio Attorney General’s CyberOhio Initiative.  This panel brings together representatives from several new initiatives with veterans in the field to discuss how the region and the state can foster increased collaboration and innovation in the field.

4:30-5:30 PM

Cybersecurity and the Public-Private Partnership

Jonathan Frenkel, Assistant General Counsel, Cyber Law Unit, FBI

Michael Halas, Attorney-Advisor, Office of the General Counsel, U.S. Department of Homeland Security

Matthew W. Shepherd, Chief, National Security and Cyber Unit, United States Attorney’s Office for the Northern District of Ohio

Greg Stein, Vice-Chair, Data Privacy and Information Security, Ulmer & Berne LLP (moderator)

Data breaches frequently are the result of criminal activity, and cyber crime has emerged as one of federal law enforcement’s top priorities. Recent federal legislation and policy emphasizes the need for information sharing between law enforcement and the private sector to counter the increasing range and sophistication of criminal attacks. This session will examine the roles the Department of Homeland Security, the FBI and the US Attorney play in developing a strong public-private partnership to prevent cybercrime and to encourage cooperation between the public and private sectors.

5:30-6:30 PM

Reception
Sponsored by Ulmer & Berne LLP

 

Watch Video: Apr 27, Part 4 - 3:15pm - 5:30pm


Friday, April 28

7:00-8:00 AM

Registration and Networking Breakfast

8:00-8:45 AM

Opening Keynote and Q&A

Travis LeBlanc, Former FCC Bureau of Enforcement Chief

8:45-9:45 AM

Data Breach Litigation and Regulatory Investigations

Doug Meal, Partner, Ropes and Gray

David Glockner, Regional Director, Securities and Exchange Commission

Alfred J. Saikali, Partner, Shook, Hardy and Bacon

Ari J. Scharg, Partner, Edelson, PC

Brian Ray, Professor and Co-Director Center for Cybersecurity and Privacy Protection, Cleveland-Marshall College of Law

A recent analysis of data breach class actions found that both the number of class actions filed and the defendants involved declined over the past year.  At the same time, the plaintiffs’ bar has developed novel claims that could significantly expand liability in this area and the security concerns posed by the explosion of connected devices and IoT raise new issues that are percolating.  Regulatory enforcement actions also continue to increase in most sectors and several significant new requirements increase those risks.  This session will review recent legal developments and open issues in data breach class actions and trends in regulatory investigations, including the incidents that result in litigation and enforcement, the laws implicated and remedies sought, as well as future trends.

9:45-10:00 AM

Networking Break

 

Watch Video: Apr 28, Part 1 -  8:00am - 9:45am


10:00-11:00 AM

Incident Response

Jeffrey Groman, Senior Manager, Mandiant, a FireEye Company

Damon Hacker, President, CEO and Founder, Vestige Digital Investigations

Robert Hanna, Partner, Tucker Ellis, LLP

Tim Opsitnick, President, JurInnov, LLC

Security incidents are now routine occurrences across all industries and regardless of an organization’s size.  This panel will provide advice on preparing for and managing security incidents through a comprehensive examination of the significant components of a typical event, including identification, forensic investigation, legal analysis, reporting and communication and working with law enforcement. 

11:00 am-11:30 PM

Closing Keynote and Q&A

Adam Hamm, Managing Director, Protiviti Global Consulting and former Chair, National Association of Insurance Commissioners Cybersecurity Task Force

11:30 am-12:30 pM

Cyber Risk Insurance

Richard DeNatale, Partner, Jones Day (Data Breach/Cyber Insurance Practice)

Kimberly K. Ferenchak, Vice President and Practice Leader of Executive Risk, Oswald Companies

Joshua Gold, Chair, Cyber Insurance Recovery Group, Anderson Kill P.C.

Adam Hamm, Managing Director, Protiviti Global Consulting and former Chair, National Association of Insurance Commissioners Cybersecurity Task Force

Bridget Sakach, Network Security and Privacy Specialist – Midwest Region, AIG

Candice Hoke, Professor and Co-Director Center for Cybersecurity and Privacy Protection, Cleveland-Marshall College of Law (moderator)

Most organizations recognize the need for cyber-risk insurance but the market’s rapid rise has resulted in a confusing array of products and options in the market.   This session will discuss the evolution of cover cyber risk, emerging trends and new products in the market, the underwriting process and key issues to consider when selecting a coverage option.

 

Watch Video: Apr 28, Part 2 - 10:00am - 12:30pm


The Conference is presented in partnership with the Northeast Ohio CyberConsortium. 


An official Tech Week Event 

  • Share