Broadcast Date: Friday, June 25, 2021
from 3:00 pm to 4:30 pm (ET)
Overview:
With today’s rapidly evolving digital landscape, cyber threats and data breaches are becoming more sophisticated in terrorizing businesses and organizations of any size. Furthermore, the constantly changing data protection and privacy requirements and policies add up to the complexities and challenges for companies. Without an effective response plan, these threats and issues may pose risks that could significantly disrupt important operations.
Thus, the need for companies to integrate effective data privacy and security platforms becomes more important than ever. Integrating these types of programs do not only ensure maximum management and protection of business data but also help to meet the ever-dynamic compliance goals of every company.
In a LIVE CLE Webcast, a panel of key thought leaders and professionals assembled by The Knowledge Group will provide the audience with an in-depth discussion of data privacy and security. Speakers will also discuss the considerations of essential data security platform and offer practical strategies in mitigating risk exposure and compliance issues.
Some of the major topics that will be covered in this course are:
- Overview of Data Privacy and Security
- Recent Cyber Threats and Data Breaches Cases
- Emerging Trends and Developments
- Factors to Consider in Selecting Efficient Data Security Platform
- Risks and Challenges
- Practical Tips and Strategies
Credit:
Course Level:
Intermediate
Advance Preparation:
Print and review course materials
Method of Presentation:
On-demand Webcast (CLE)
Prerequisite:
General Knowledge of cybersecurity
Course Code:
149114
NY Category of CLE Credit:
Law Practice Management
Total Credits:
1.5 CLE
How to Claim CLE Credits Per State:
https://knowledgewebcasts.com/how-to-claim-cle-credits-per-state/
CLE State Requirements:
https://knowledgewebcasts.com/cle-state-requirements/
CPE State Requirements:
Speaker Panel:
Joe Linscott, Director of Product Strategy
PKWARE, Inc.
Joe is adept in the markets of cyber security. He is currently Director of Product Strategy at PKWARE where he aids teams in guiding the overall direction of products. Joe graduated from University of Wisconsin Milwaukee with a Bachelor of Science in Computer Science.
Akshay Kumar, Senior Product Analyst
PKWARE, Inc.
Akshay Kumar is a Senior Product Analyst at PKWARE, serving as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid deployments and helped clients become GDPR/PCI/PHI compliant. In addition, Akshay gained data center infrastructure experience from being a software engineer at Arista Networks, where he oversaw large-scale server maintenance and lab network utility. Akshay holds a Bachelor of Science in Computer Science from University of California, Davis.
Kenneth Dort, Partner
Faegre Drinker Biddle & Reath LLP
Kenneth Dort is a preeminent resource on mission-critical data security issues and is consulted often for immediate counsel on high-stakes data breaches, as well as for guidance and strategy on the privacy and other legal implications of new technologies. Ken is CIPP/US, CIPP/E and CIPP/C certified and is a recognized adviser to clients around the world on data security and privacy practices and compliance needs arising under federal, state, provincial and international laws and industry standards. He also is a powerful litigator in the courtroom, a deft negotiator with regulators and a valued counselor on software development and integration.
Agenda:
Segment 1:
Joe Linscott
Director of Product Strategy
PKWARE, Inc.
AND
Akshay Kumar
Senior Product Analyst
PKWARE, Inc.
Talking Points:
- Data Mapping and Data Protection
- Data Awareness
- Discovery
- Business use case
- IT Security
- Process and Procedures that incorporate Data Mapping and Data Protection
- Breach Response
Segment 2:
Kenneth Dort
Partner
Faegre Drinker Biddle & Reath LLP
- Risk Assessments
- Reasons – Legal Requirements/Best Practices
- Frequency
- Conjunction with Day Mapping/Flows
- Vulnerability Identification
- Identification of Threats
- Third-Party Controls
- Reasons -- Legal Requirements/Best Practices
- Implementation and Verification
- Auditing Rights
- Selection of Appropriate Cyber Security Control Levels
- Grounded on Risk Assessments
- Technical, Administrative/Physical
- Appropriate to Sensitivity of Data
- Best Practices v. Requirements
Date & Time:
Friday, June 25, 2021
3:00 pm to 4:30 pm (ET)
Who Should Attend:
- Chief Information Security Officers
- Chief Security Officers
- IT Directors and Managers
- System Administrators
- IT Auditors
- IT Governance Officers
- Risk Management Analysts
- Data Security Officers
Join Over 150,000 Professionals Empowering Their Careers
Learn anywhere from over 1900+ live and recorded CLE, CPE & Technology Webcasts.