Broadcast Date: Wednesday, March 11, 2020
from 12:00 pm to 1:30 pm (ET)


The intensity and volume of cyber threats and attacks have continuously increased over the past years. Businesses have become more prone to risks of cybersecurity breaches that management plans must not only be effective, but also aggressive.

To address this concern, it is imperative for businesses to have a solid foundation that will effectively secure and protect their network.

In this LIVE Webcast, cybersecurity experts Srikrupa Srivatsan (Infoblox) and Corey Maypray (Eli Lilly and Company) will provide the audience with an in-depth analysis of the fundamentals as well as recent developments concerning cyber threats and attacks. As experts, they will also provide practical tips and strategies in effectively handling this growing digital issue.

Key topics include:

  • Cyber Threats: Trends Over the Past Years
  • Common Risks and Challenges
  • Effective Cyber Threat Solutions
  • Practical Tips and Strategies
  • Outlook


Course Level:



Advance Preparation:

Print and review course materials


Method of Presentation:

On-demand Webcast (CLE)



General knowledge of cybersecurity


Course Code:



NY Category of CLE Credit:

Law Practice Management


Total Credits:

1.5 CLE

Speaker Panel:

Srikrupa Srivatsan, Director, Product Marketing

Srikrupa has 20 years of experience in technology in various roles including software development, product management and product marketing. Currently, as Director of Product Marketing at Infoblox, she is responsible for messaging, positioning and bringing to market Infoblox’s security solutions that optimize security operations and provide foundational security against known and zero-day threats. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.

Corey Maypray, Advisor – Threat Intelligence and Detection Capabilities
Eli Lilly and Company

Corey currently acts as an Advisor-Threat Intelligence and Detection for Eli Lilly and Company.  In this role he is responsible for developing and maturing Lilly’s Information Security Cyber Threat Intelligence program and driving the creation of better threat detection capabilities. Prior to joining Lilly, Corey served twelve years in the Army as an All Source Threat Analyst where he performed a variety of intelligence functions including collection management, threat/intelligence analysis, and operational assignments to support operations abroad. Corey has specialties in threat entity targeting, open source intelligence collection, and intelligence support to counter terrorism, weapons of mass destruction, geo-political tensions, and cyber based threats.


Srikrupa SrivatsanDirector, Product Marketing


Digital transformation and evolving IT architectures greatly impact security. While the threat landscape continues to change, so do the complexity of networks, where data is stored and how end users connect.

  • Edge computing, multi-cloud, SD-WAN and IoT have caused an increase in risk to a company’s infrastructure, data and brand. Security approaches need to change to address these transformations.
  • Learn how to improve the efficacy of your existing security investments by using foundational infrastructure as an enforcement point and integrating the silos of security tools.
  • Use contextual data for more efficient SecOps and threat prioritization.

Corey MayprayAdvisor – Threat Intelligence and Detection Capabilities

Eli Lilly and Company

“If you know the enemy and yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” - Sun Tzu

  1. Know yourself: Learn your environment (people, processes, technology).
  2. Know your adversary: Learn your adversaries motivations (motive and targeted data) and capabilities (attack methods, TTP’S and resources).
  3. Prioritize protection of your most critical assets and operations.
  1. Cyber security resources remain limited. Organizations that attempt to broadly protect their data from all cyber threats tend to inefficiently invest these resources, making them slower to adapt to the changing trends and techniques of cyber threats. – Carnegie Mellon

Date & Time:

Wednesday, March 11, 2020

12:00 pm to 1:30 pm (ET)

Who Should Attend:

  • Chief Information Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Network Engineers and Managers
  • Cyber Security Professionals
  • IT VPs and Directors
  • Operations and Incident Response Teams
Preventing Ransomware Attacks: A Practical Guide to Enhancing IT Security and Resiliency,
Speaker Preferred Package (Online Payment)
Asbestos Litigation: Demystifying Trends, Developments, and Defense Strategies,
New York Online CLE Bundle
Pennsylvania Online CLE Bundle
California Online CLE Bundle
Supercharging Privilege Review With AI, Analytics, and Automation,
The Hows and Whys of Child Abuse Reporting: A Comprehensive Ethical Guide for Lawyers,
Maximizing Your Innovation ROI: R&D Tax Credits in 2024 and Beyond,
Winning Patent Litigation: Essential Strategies and Tactics,
Cartel Investigations: A Blueprint for Defense,
Demystifying Economic Sanctions: Strategies for Success in a Global Economy,
Practical Trademark Perspectives from U.S. and Canadian Counsel,
Effectively Manage KYC Compliance: Keep Up with the Times by Getting Back to Basics,
OFAC Regulations and the Economic Sanctions Compliance Programs: Best Practices,
'Zombie' LIBOR for USD Contracts: Navigating the Critical Issues, ,
Calculating Lost Profits in Construction Claims: A Practical Guide,
False Claims Act and COVID-19 Implications: Key Considerations and Best Practices, ,


Srikrupa SrivatsanDirector, Product Marketing
Corey MayprayAdvisor – Threat Intelligence and Detection Capabilities
Eli Lilly and Company



View Details


View Details


View Details

Join Over 160,000 Professionals Empowering Their Careers

Learn anywhere from over 3000+ live and recorded CLE, CPE & Technology Webcasts.