Broadcast Date: Friday, June 25, 2021
from 3:00 pm to 4:30 pm (ET)


With today’s rapidly evolving digital landscape, cyber threats and data breaches are becoming more sophisticated in terrorizing businesses and organizations of any size. Furthermore, the constantly changing data protection and privacy requirements and policies add up to the complexities and challenges for companies. Without an effective response plan, these threats and issues may pose risks that could significantly disrupt important operations.

Thus, the need for companies to integrate effective data privacy and security platforms becomes more important than ever. Integrating these types of programs do not only ensure maximum management and protection of business data but also help to meet the ever-dynamic compliance goals of every company.

In a LIVE CLE Webcast, a panel of key thought leaders and professionals assembled by The Knowledge Group will provide the audience with an in-depth discussion of data privacy and security. Speakers will also discuss the considerations of essential data security platform and offer practical strategies in mitigating risk exposure and compliance issues.

Some of the major topics that will be covered in this course are:

  • Overview of Data Privacy and Security
  • Recent Cyber Threats and Data Breaches Cases
  • Emerging Trends and Developments
  • Factors to Consider in Selecting Efficient Data Security Platform
  • Risks and Challenges
  • Practical Tips and Strategies


Course Level:



Advance Preparation:

Print and review course materials


Method of Presentation:

On-demand Webcast (CLE)



General Knowledge of cybersecurity


Course Code:



NY Category of CLE Credit:

Law Practice Management


Total Credits:

1.5 CLE

Speaker Panel:

Joe Linscott, Director of Product Strategy

Joe is adept in the markets of cyber security. He is currently Director of Product Strategy at PKWARE where he aids teams in guiding the overall direction of products. Joe graduated from University of Wisconsin Milwaukee with a Bachelor of Science in Computer Science.

Akshay Kumar, Senior Product Analyst

Akshay Kumar is a Senior Product Analyst at PKWARE, serving as the product lead for Hadoop Distributed File Systems (HDFS) and cloud storage modules, in addition to growing key partnerships with companies like AWS and IBM. Prior to joining PKWARE via the Dataguise acquisition in 2020, Akshay built his data security background as a solutions architect, where he implemented hybrid deployments and helped clients become GDPR/PCI/PHI compliant. In addition, Akshay gained data center infrastructure experience from being a software engineer at Arista Networks, where he oversaw large-scale server maintenance and lab network utility. Akshay holds a Bachelor of Science in Computer Science from University of California, Davis.

Kenneth Dort, Partner
Faegre Drinker Biddle & Reath LLP

Kenneth Dort is a preeminent resource on mission-critical data security issues and is consulted often for immediate counsel on high-stakes data breaches, as well as for guidance and strategy on the privacy and other legal implications of new technologies. Ken is CIPP/US, CIPP/E and CIPP/C certified and is a recognized adviser to clients around the world on data security and privacy practices and compliance needs arising under federal, state, provincial and international laws and industry standards. He also is a powerful litigator in the courtroom, a deft negotiator with regulators and a valued counselor on software development and integration.


Segment 1:

Joe Linscott

Director of Product Strategy



Akshay Kumar

Senior Product Analyst


Talking Points:

  • Data Mapping and Data Protection
    • Data Awareness
    • Discovery
    • Business use case
  • IT Security
  • Process and Procedures that incorporate Data Mapping and Data Protection
  • Breach Response

Segment 2:

Kenneth Dort


Faegre Drinker Biddle & Reath LLP

  • Risk Assessments
    • Reasons – Legal Requirements/Best Practices
    • Frequency
    • Conjunction with Day Mapping/Flows
    • Vulnerability Identification
    • Identification of Threats
  • Third-Party Controls
    • Reasons -- Legal Requirements/Best Practices
    • Implementation and Verification
    • Auditing Rights
  • Selection of Appropriate Cyber Security Control Levels
    • Grounded on Risk Assessments
    • Technical, Administrative/Physical
    • Appropriate to Sensitivity of Data
    • Best Practices v. Requirements

Date & Time:

Friday, June 25, 2021

3:00 pm to 4:30 pm (ET)

Who Should Attend:

  • Chief Information Security Officers
  • Chief Security Officers
  • IT Directors and Managers
  • System Administrators
  • IT Auditors
  • IT Governance Officers
  • Risk Management Analysts
  • Data Security Officers
Preventing Ransomware Attacks: A Practical Guide to Enhancing IT Security and Resiliency,
Speaker Preferred Package (Online Payment)
Asbestos Litigation: Demystifying Trends, Developments, and Defense Strategies,
New York Online CLE Bundle
Pennsylvania Online CLE Bundle
California Online CLE Bundle
Supercharging Privilege Review With AI, Analytics, and Automation,
The Hows and Whys of Child Abuse Reporting: A Comprehensive Ethical Guide for Lawyers,
Understanding R&D Tax Credits and Amortization: Navigating Changes and Maximizing Benefits,
Maximizing Your Innovation ROI: R&D Tax Credits in 2024 and Beyond,
Winning Patent Litigation: Essential Strategies and Tactics,
Cartel Investigations: A Blueprint for Defense,
Demystifying Economic Sanctions: Strategies for Success in a Global Economy,
Antitrust 'No-Poach' Agreement Enforcement: Key Focus Areas in 2024,
Practical Trademark Perspectives from U.S. and Canadian Counsel,
Effectively Manage KYC Compliance: Keep Up with the Times by Getting Back to Basics,
OFAC Regulations and the Economic Sanctions Compliance Programs: Best Practices,
'Zombie' LIBOR for USD Contracts: Navigating the Critical Issues, ,
Calculating Lost Profits in Construction Claims: A Practical Guide,
False Claims Act and COVID-19 Implications: Key Considerations and Best Practices, ,



Joe LinscottDirector of Product Strategy
Akshay KumarSenior Product Analyst
Kenneth DortPartner
Faegre Drinker Biddle & Reath LLP



View Details


View Details


View Details

Join Over 160,000 Professionals Empowering Their Careers

Learn anywhere from over 3000+ live and recorded CLE, CPE & Technology Webcasts.