REGISTER - LIVE WEBCAST
  • Sale!

Overview:

With today’s rapidly evolving digital landscape, cyber threats and data breaches are becoming more sophisticated in terrorizing businesses and organizations of any size. Furthermore, the constantly changing data protection and privacy requirements and policies add up to the complexities and challenges for companies. Without an effective response plan, these threats and issues may pose risks that could significantly disrupt important operations.

Thus, the need for companies to integrate effective data privacy and security platforms becomes more important than ever. Integrating these types of programs do not only ensure maximum management and protection of business data but also help to meet the ever-dynamic compliance goals of every company.

In a LIVE CLE Webcast, a panel of key thought leaders and professionals assembled by The Knowledge Group will provide the audience with an in-depth discussion of data privacy and security. Speakers will also discuss the considerations of essential data security platform and offer practical strategies in mitigating risk exposure and compliance issues.

Some of the major topics that will be covered in this course are:

  • Overview of Data Privacy and Security
  • Recent Cyber Threats and Data Breaches Cases
  • Emerging Trends and Developments
  • Factors to Consider in Selecting Efficient Data Security Platform
  • Risks and Challenges
  • Practical Tips and Strategies

Credit:

Course Level:

Intermediate

 

Advance Preparation:

Print and review course materials

 

Method of Presentation:

Live Webcast

 

Prerequisite:

General Knowledge of cybersecurity

 

Course Code:

149114

 

NY Category of CLE Credit:

Law Practice Management

 

Total Credits:

1.5 CLE


CLE State Requirements:

https://knowledgewebcasts.com/cle-state-requirements/

Speaker Panel:

Joe Linscott, Director of Product Strategy
PKWARE, Inc.

Joe is adept in the markets of cyber security. He is currently Director of Product Strategy at PKWARE where he aids teams in guiding the overall direction of products. Joe graduated from University of Wisconsin Milwaukee with a Bachelor of Science in Computer Science.

Akshay Kumar, Senior Product Analyst
PKWARE, Inc.

Akshay Kumar is a Senior Product Analyst at PKWARE, serving as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid deployments and helped clients become GDPR/PCI/PHI compliant. In addition, Akshay gained data center infrastructure experience from being a software engineer at Arista Networks, where he oversaw large-scale server maintenance and lab network utility. Akshay holds a Bachelor of Science in Computer Science from University of California, Davis.

Kenneth Dort, Partner
Faegre Drinker Biddle & Reath LLP

Kenneth Dort is a preeminent resource on mission-critical data security issues and is consulted often for immediate counsel on high-stakes data breaches, as well as for guidance and strategy on the privacy and other legal implications of new technologies. Ken is CIPP/US, CIPP/E and CIPP/C certified and is a recognized adviser to clients around the world on data security and privacy practices and compliance needs arising under federal, state, provincial and international laws and industry standards. He also is a powerful litigator in the courtroom, a deft negotiator with regulators and a valued counselor on software development and integration.

Agenda:

Segment 1:

Joe Linscott

Director of Product Strategy

PKWARE, Inc.

AND

Akshay Kumar

Senior Product Analyst

PKWARE, Inc.

Talking Points:

  • Data Mapping and Data Protection
    • Data Awareness
    • Discovery
    • Business use case
  • IT Security
  • Process and Procedures that incorporate Data Mapping and Data Protection
  • Breach Response

Segment 2:

Kenneth Dort

Partner

Faegre Drinker Biddle & Reath LLP

  • Risk Assessments
    • Reasons – Legal Requirements/Best Practices
    • Frequency
    • Conjunction with Day Mapping/Flows
    • Vulnerability Identification
    • Identification of Threats
  • Third-Party Controls
    • Reasons -- Legal Requirements/Best Practices
    • Implementation and Verification
    • Auditing Rights
  • Selection of Appropriate Cyber Security Control Levels
    • Grounded on Risk Assessments
    • Technical, Administrative/Physical
    • Appropriate to Sensitivity of Data
    • Best Practices v. Requirements

Date & Time:

Friday, June 25, 2021

3:00 pm to 4:30 pm (ET)

A recording will be available to view 24-48 hours after the live date.

Materials:

Coming Soon.

Please check back again later.

Who Should Attend:

  • Chief Information Security Officers
  • Chief Security Officers
  • IT Directors and Managers
  • System Administrators
  • IT Auditors
  • IT Governance Officers
  • Risk Management Analysts
  • Data Security Officers

SPONSOR

SPEAKERS

Joe LinscottDirector of Product Strategy
PKWARE, Inc.
Akshay KumarSenior Product Analyst
PKWARE, Inc.
Kenneth DortPartner
Faegre Drinker Biddle & Reath LLP

RELATED WEBCASTS

SUBSCRIPTION PACKAGES

ALL-ACCESS PASS

View Details

CLE LAW MONTHLY

View Details

CPE FINANCE MONTHLY

View Details

Join Over 150,000 Professionals Empowering Their Careers

Learn anywhere from over 1800+ live and recorded CLE CPE & Technology webcasts.