2017 Technology & Data Protection Forum
Wednesday, April 12, 2017 • 9:00 a.m. - 4:45 p.m.
Registration opens at 8:30 a.m.
Please join us for the 2017 Technology & Data Protection Forum with reception to follow.
Cost: $249; complimentary for current Baird Holm clients and other invited guests.
For questions, please contact Sarah Morris at 402.636.8356.
Many organizations that create, maintain, and access sensitive data must conduct a periodic security risk assessment to identify and quantify risks to the security of the information and to develop a plan to mitigate those risks. The various regulatory frameworks, including HIPAA, Sarbanes-Oxley, and the Gramm-Leach Bliley Act, all require covered organizations to conduct security risk assessments. There is no one-size-fits-all risk assessment. Depending on the type, size, budget, and complexity of the organization, a security risk assessment will look much different from one organization to the next. However, there are common issues that must be addressed when conducting a security risk assessment including, allocation of resources, scope of the assessment, methods used, engaging an outside vendor, and attorney-client privilege.
This session will cover the basics of risk assessments, including:
- When the organization must conduct the assessment
- What the assessment should cover
- Who should perform the assessment
- What are the deliverables
- Applicability of attorney-client privilege
10:15 a.m. - 11:00 a.m.
Emerging Threats: Security in the New World
Ron Woerner, Bellevue University
Do you wonder what’s happening on the current Cyber Threat Landscape? This presentation provides an up-to-date briefing about malicious cybercrime, the evolution of hackers, how the underground economy works and how it affects the corporate IT landscape on-premises and in the cloud. You will also hear about relevant security solutions and strategies for businesses to use to prevent harmful cyber activity.
The presentation will cover:
- Insight into emerging cyber threats
- A profile of today’s evolved hackers: what they are after, why, and how they’re getting what they want
- Strategies and tools you can implement to safeguard against attacks
Ron Woerner is a noted speaker and writer in the Security industry. He has over 25 years of IT and Security experience and has established the security practices for multiple Midwest organizations. He writes for CSOOnline.com, IBM Security Intelligence, and the Tripwire blog. He has been a feature speaker at the RSA conference for over 10 years. Last year, Ron was an official state delegate at Israel’s CyberTech conference. Ron built the Bellevue University Cybersecurity Studies program and continues to teach there as an adjunct professor. He is also the Information Security Architect for a large, international hotel management company. Ron loves to talk to others who are passionate about Security and Privacy.
It's not a matter of whether your organization will be breached, but when. And, most importantly, how bad the damage will be. Your organization likely has a response plan in place, but is it battle tested? Your response in the first hours after initially discovering the incident will be crucial in mitigating financial and reputation damage. In this session, attendees will participate in an interactive, in-depth discussion around a data breach scenario, details of which will unfold throughout the session, to discover best practices for breach preparation and response.
Note: audience participation via on-line voting
12:30 p.m. - 2:30 p.m.
12:30 p.m. -1:00 p.m. Lunch
1:00 p.m. – 2:30 p.m. Panel Presentation - Hot Topics and Panel for Audience Q&A
- Cyber Litigation Update
- Employment Law Update
- CFB Financial Update
- EU Data Protection Update
2:30 p.m. - 2:45 p.m.
Break and Refreshments
This session will take a deeper look at cyber insurance coverage with an in-depth discussion of insurance coverages, including insuring agreements, definitions, exclusions and other "gotchas."
This presentation will:
- Review the importance of the insurance application
- Review policy language "gotchas," including definitions and policy exceptions
- Discuss the benefits of using a captive insurance company
- Discuss the importance and timing of notice of a potential security incident
3:45 p.m. - 4:45 p.m.
CEO in the Hot Seat: Leadership in the Face of a Data Breach
Moderated by Vickie B. Ahlers
It is not uncommon for companies that have faced a significant data security incident to see a shake-up in management in the wake of the breach. This session will feature a local CEO who led his organization during a costly data breach in 2016. In this CEO conversation, we will explore the challenges faced by leadership in managing the organization through the breach – how to keep up employee morale, how to keep leadership's focus on key business areas while providing the necessary time, attention and leadership support to the breach response, and how to win Board or executive approval of doing the right thing, even when it could cost the organization time and money.
Adjourn and Reception
Please join us for complimentary cocktails and appetizers immediately following the program.
Continuing Education Credit
This program is approved for:
- 6.83 hours of CLE credit by the Nebraska Mandatory Continuing Legal Education Commission
- 6.5 hours of CLE credit by the Iowa Supreme Court Commission on Continuing Legal Education
This program has been submitted and is pending approval for:
- International Association of Privacy Professionals (IAPP) certification.
- CCB CEUs by The Compliance Certification Board (CCB). Continuing Education Units are awarded based on individual attendance records. Granting of prior approval in no way constitutes endorsement by CCB of this program content or of the program sponsor.