Join us in New York for the afternoon of April 25, 2018 — or participate via live webstream* — for this half-day seminar designed to give you the background and practical insights you need to develop your practice, protect your client, or advise your company or law firm on cyber risks to our critical infrastructure. (Note: This event immediately follows a morning seminar on blockchain security relating to the finance, insurance and practice of law sectors.)
co-chair
Vincent J. Vitkowsky
Partner
Seiger Gfeller Laurie LLP
co-chair
Daniel B. Garrie
JAMS Neutral;
Managing Partner at
Law & Forensics;
CISO at Zeichner
Ellman & Krause
Where
The Roosevelt Hotel
45 East 45th Street
New York
888-833-3969
Registration Fee
$495
Webstream* Registration Fee
$495 Now just $195!
Join us via the web
Receive materials
Ask questions
* Webcast not available in New York, New Jersey, Pennsylvania, Connecticut.
Sponsors
Sales
Brownie.Bokelman@LitigationConferences.com
Suzanne.Armstrong@LitigationConferences.com
Faculty
alpha order
Richard J. Bortnick
Senior Counsel
Traub Lieberman
Straus & Shrewsberry LLP
Edward “Ted” Brown
Partner
Wiley Rein
Megan L. Brown
Partner
Wiley Rein LLP
Formerly with
U.S. Department of Justice
Donald R. Codling
Codling Group International
former Unit Chief
FBI Cyber Division
Gus P. Coldebella
Partner
Fish & Richardson
Former acting General Counsel
Former Deputy General Counsel
U.S. Department of Homeland Security
Jacob Dorval
Global Services Product Lead
RSA NetWitness Suite
RSA Security
Former network intelligence analyst
U.S. Air Force
Jordan L. Fischer
Partner
Xpan Law
Daniel B. Garrie
Neutral at JAMS;
Managing Partner at
Law and Forensics; and
CISO at Zeichner Ellman & Krause
Helena Korobko
Technical Account Executive
Sprint
Matthew Majkut
Director Privacy & Cybersecurity
Paul Hastings
Also visiting professor at
Fitchburg State University;
Formerly with IBM
Michael Phillips
Cyber and Tech E&O Claims
Beazley
Tamara Snowdon
Senior Vice President
Cyber and E&O Practice
Marsh USA Inc., FINPRO
Vincent J. Vitkowsky
Partner
Seiger Gfeller Laurie LLP
Elad Yoran
CEO, Security Growth Partners
Executive Chairman
KoolSpan
Want to work with us and sponsor
a Cyber Sector Risk program?
We’re often charming.
Sales
Brownie.Bokelman@LitigationConferences.com
Suzanne.Armstrong@LitigationConferences.com
AGENDA
12:45 | Registration
1:45 | Welcome & Opening Remarks
2:00 | THE PUBLIC-PRIVATE PARTNERSHIP
HOW IT WORKS . . . OR SHOULD!
“Cooperation between the public and private sectors is an essential aspect of our national cybersecurity strategy,” reads a recent blog post for Penn Wharton at the University of Pennsylvania. “Cybersecurity [Public-Private Partnerships (PPPs)] must be based on a foundation of mutual trust, and open dialogue between private companies and the government can help to ameliorate some of the reluctance in the private sector. Moreover, by clarifying the regulatory framework surrounding cybersecurity, the government can better assuage private companies’ hesitations to reach out to the government in the event of an attack. By addressing these concerns, cybersecurity PPPs can work to develop strategies for risk management and information sharing, and both the private sector and the government will be better equipped to handle future cyberthreats.” That’s the impetus behind our kick-off session with a speaker who is uniquely qualified to address the issue.
Speaker
Jamil Jaffer, VP Strategy & Business Development, IronNet Cybersecurity, formerly served as counsel to the White House, Senate and U.S. Department of Justice
2:20 | THE URGENCY OF CYBER THREATS TO U.S.
& GLOBAL CRITICAL INFRASTRUCTURES
“The electric grid and most infrastructure we have is actually fairly well built for reliability and safety,” writer Jesse Dunietz said in Scientific America. However, he continued, “That safety and reliability has never been thought of from a cybersecurity perspective . . . [O]ur adversaries are getting much more aggressive. They’re learning a lot about our industrial systems, not just from a computer technology standpoint but from an industrial engineering standpoint, thinking about how to disrupt or maybe even destroy equipment. That’s where you start reaching some particularly alarming scenarios.”
What we will cover:
Nuclear power plants and the electricity power grid
Chemical manufacture and distribution
Telecommunications
Shipping: threats to ports
Transportation
Financial services
Water supplies
Plus
State-sponsored cyber attacks
Speakers
Vincent J. Vitkowsky, Partner, Seiger Gfeller Laurie LLP, has served as Adjunct Fellow at the Center for Law and Counterterrorism
Megan L. Brown, Partner, Wiley Rein LLP, formerly with the U.S. Department of Justice
Helena Korobko, Technical Account Executive, Sprint
Jacob Dorval, Global Services Product Lead, RSA NetWitness Suite, RSA Security, formerly Network Intelligence Analyst with the U.S. Air Force
Gus P. Coldebella, Partner, Fish & Richardson, former acting General Counsel, U.S. Department of Homeland Security
3:15 | IDENTIFYING, UNDERSTANDING AND LIMITING
YOUR LEGAL VULNERABILITIES
When any part of our critical infrastructure goes down, the ramifications go way beyond having to find your flashlight. How will your organization deliver goods and services? How will you guard your data? How will your operations be crippled? What liabilities will you face from customers, suppliers, and government agencies?
What we will cover:
Third-party claims
Physical damage
Bodily injury claims
Supply chain disruption
Business interruption claims
Regulator and compliance claims
Insurance coverage for liabilities and damage resulting from attacks
Plus
Unique risks when converting from legacy systems
Effective crisis communication
Speakers
Edward (Ted) Brown, Associate, Wiley Rein
Michael Phillips, Tech, E&O & Cyber Claims Manager, Beazley
Jordan L. Fischer, Partner, Xpan Law
Melanie Dougherty, Managing Director, Inform
4:15 | Break
4:45 | CASES IN POINT:
LESSONS LEARNED FROM RECENT ATTACKS & MISHAPS
In a post by Willis Towers Watson, The [WannaCry ransomware] attack first came to light mid-afternoon in the U.K. on May 12 and then spread across the globe, affecting computers in China, France, Germany, Japan, Russia, Spain and the U.S. The attack also impacted many industries, including health care providers (mainly hospitals), manufacturing, telecommunications, utilities, logistics, transportation and educational facilities.”
What we will cover:
Understanding malware and ransomware attacks.
How were these and other attacks executed?
What vulnerabilities were exploited?
How were these attacks halted?
Confronting ransomware: insurance perspectives
Daniel B. Garrie, Neutral at JAMS; Managing Partner at Law and Forensics; and
CISO at Zeichner Ellman & Krause
Elad Yoran, CEO, Security Growth Partners; Executive Chairman, KoolSpan
David Cass, CISO, Cloud & SaaS Operational Services, IBM
Richard J. Bortnick, Senior Counsel, Traub Lieberman Straus & Shrewsberry LLP
Tamara Snowdon, Senior Vice President, Cyber and E&O Practice, Marsh USA Inc., FINPRO
5:30 | PREVENTING & MITIGATING THE DAMAGE
In a post for the Cyber Security Law & Policy blog, writer Ryan White wrote that President Trump’s announced strategy “acknowledges the threats that exist to critical infrastructure, federal networks, and security for both businesses and individuals in the private sector. The strategy identifies the nation’s cyber capabilities as determinative of its future: ‘America’s response to the challenges and opportunities of the cyber era will determine our future prosperity and security.’ The priority actions are: Identify and Prioritize Risk; Build Defensible Government Networks; Deter and Disrupt Malicious Cyber Actors; Improve Information Sharing and Sensing; Deploy Layered Defenses. All of those are laudable goals and logically sound steps to achieving cyber security. But, it is much easier said than done.”
Donald R. Codling, Codling Group International, former Unit Chief, FBI Cyber Division
Matthew Majkut, Director Privacy & Cybersecurity, Paul Hastings, Also visiting professor at Fitchburg State University; formerly with IBM
Jeff Tutton, MSc., QSA, CCFE, President, Global Security & Compliance Intersec Worldwide, Inc.
What we will cover:
How to identify and prioritize risks
Building more defensible networks
Improving information sharing and sensing
Testing incident response and back-up plans
Recovering from attacks
6:15 | Adjourn