May 30 Schedule

Thursday, MAY 30

7:30-8:00 am

Breakfast and Registration

Materials sponsored by TCDI

8:00-8:15 am  Watch Part 1

Welcome and Introductions

  • Brian Ray, Cleveland-Marshall College of Law

8:15-9:15 am

FTC’s Role As National Privacy Enforcer: A Fireside Chat

  • Federal Trade Commissioner Rebecca Kelly Slaughter
  • Brian Ray, Cleveland-Marshall College of Law

9:15-10:15 Am  Watch Part 2

FTC Cybersecurity Security and Privacy Hearings and Proposed Legislation

Following up on the opening fireside chat with Federal Trade Commissioner Rebecca Kelly Slaughter, this panel will examine the issues raised in the FTC’s recent hearings on consumer data privacy and the prospects for a comprehensive federal privacy law that could expand the FTC’s authority and possibly preempt state data security and privacy laws.

  • James Trilling, Federal Trade Commission
  • David C. Shonka. Redgrave LLP
  • Douglas Meal, Orrick, Herrington & Sutcliffe LLP
  • Lydia Parnes, Wilson Sonsini Goodrich & Rosati
  • Brian Ray, Cleveland-Marshall College of Law

10:15-10:25 am

Networking Break

10:25-10:50 am  Watch Part 3

California’s Privacy Act and the New Wave of State Regulation 

  • Travis LeBlanc, Partner Cooley, LLP​

10:50-11:50 am

State Regulatory Developments

This panel will discuss the new wave of state privacy and cybersecurity laws, including the California Consumer Privacy Act, the Ohio Data Protection Act, the newly energized Illinois Biometric Privacy Act and several others. We’ll examine the challenges these laws pose for organizations and emerging past practices for complying with them.

  • Travis LeBlanc, Cooley LLP
  • Gregory A. Tapocsi, Dinsmore & Shohl LLP
  • Ian Fisher, Hahn Loeser & Parks LLP

11:50 am-12:20 pm


Sponsored by Tucker Ellis LLP 

12:20-12:45 pm  Watch Part 4

HIPAA Compliance and Enforcement Update  

This presentation will highlight recent HIPAA enforcement actions, future enforcement trends and priorities, and future regulatory and guidance initiatives. His discussion will explore best practices for HIPAA enforcement learned from OCR’s investigative work and highlight strategies for building an effective HIPAA compliance program.

  • Steven Mitchell, U.S. Dep't. of Health and Human Services

12:45-1:45 pm  Watch Part 5

Health Care Sector Deep Dive

Health care organizations store tens of millions of records with highly sensitive and valuable information, making them a frequent target for cybercrime. Our first industry deep dive brings together leaders from HHS OCR, major health care organizations and expert advisors to the industry to discuss these trends, best practices for addressing them and how those practices translate to other industries facing similar threats.

  • William Berglund, Tucker Ellis LLP
  • Steven Mitchell, U.S. Dep't. of Health and Human Services
  • David Schweighoefer , Day Ketterer
  • Gregory Stein, Cleveland Clinic
  • Jami Mills Vibbert, Venable LLP     

1:45-1:55 pm

Networking Break

1:55-2:55 pm  Watch Part 6

Cyber Risk Management (or How to Comply with Everything)

Developing cybersecurity and privacy policies and procedures to comply with applicable regulations is only the first step in securing your data and preventing a breach. This panel will discuss how organizations of all sizes can develop a cyber risk management approach that will enable them to develop a comprehensive, robust and resilient cybersecurity posture applicable across regulatory regimes.

  • Chris Cronin, Halock Security Labs
  • Kirk Herath, Nationwide Insurance
  • Matthew Neely, Progressive Insurance
  • Timothy Opsitnick, TCDI
  • Spence Witten, Lunarline, Inc.

2:55-3:55 pm  Watch Part 7

Incident Response and Cyber Risk Insurance

This session will discuss developing, implementing and executing incident response policies and procedures before, during and after a security breach, including defensible incident response plans; who should be on the incident response team; breach notification requirements and the important role that cyber risk insurance can play in both preparing for an incident and responding to it.

  • Joseph Compton, Skoda Minotti
  • Robert Eckman, Kent State University
  • Amanda Rose Martin, McDonald Hopkins LLC
  • Julian Sylvestro, Hylant Insurance
  • Thomas F. Zych, Thompson Hine LLP

3:55-4:05 pm

Networking Break

4:05-5:05 pm  Watch Part 8

Working with Law Enforcement

Data breaches frequently are the result of criminal activity, and cybercrime has emerged as one of federal law enforcement’s top priorities. This panel will discuss the important role that law enforcement agencies can play as partners in responding to data breaches that result from criminal conduct and the value of establishing a strong relationship with these agencies as part of your cybersecurity program.

  • Richard Florence, Federal Bureau of Investigation
  • Timothy Opsitnick, TCDI
  • Matthew Shepherd, U.S. Attorney’s Office
  • Dean Valore, Valore & Gordillo, LLP

5:05-6:00 pm

Cocktail Reception 

Sponsored by Ulmer & Berene LLP

  • Share