Get In Touch


Cybersecurity: Technology & the Law


Photo of Cybersecurity: Technology & the Law

Who Should Attend
Attorneys, business executives, government officials, information security professionals and consultants involved with critical infrastructure and sensitive information needing protection from cyber attacks

Why You Should Attend
Massive cyber attacks and data breaches have grabbed headlines, upended companies, and shaken consumer confidence in the safety of their information. Sony, Anthem and Premera are only the most recent companies to that find their names on the front pages and whose breaches have affected tens of millions of consumers. Consumer information, however, is by no means the only data at risk as companies collect, store and mine exabytes of data for purposes ranging from health care monitoring to location tracking for push advertising.

The data itself is not our only concern. Our privacy and anonymity are also called into question by the proliferation of information about all of us that is collected, mined, sifted, traded and sold by thousands of companies, dozens of governments and unknown numbers of criminal syndicates. The explosive growth of the Internet of Things, location services and WiFi enables cyber hackers, online advertising companies and the government to track and record an individual's physical movements as well as their online activity. Hackers may be able to open the door of your house or disable your car if you are accessing them remotely yourself. Companies in this industry may find themselves liable to people suffering physical harm.

The level of risk and severity of potential consequences vary from industry to industry and company to company. The challenge for every company is to accurately assess cybersecurity risks and address them in a cost-effective way.

Some of our speakers have been actively involved in development of the National Institute of Standards and Technology (NIST) Cybersecurity Framework and other aspects of cybersecurity planning. Other speakers know how to leverage industry standards and best practices to protect systems and detect potential problems, including legacy systems, along with processes to keep informed of current threats and be prepared for timely response and recovery. Join us for a stimulating and enlightening discussion of cybersecurity policy, risk management, and practical lessons learned.

What You Will Learn

  • Cyber information sharing
  • Federal legislative and regulatory trends; lessons from recent breach class action suits on standing
  • What is the FTC teaching data owners about the standards of care?
  • Healthcare, higher education and retail cybersecurity concerns
  • Passive DNS methods as powerful tools
  • Case studies in enterprise security
  • Cloud security
  • Cybersecurity and privacy
  • Pre-breach planning essentials
  • Cyber insurance coverage

For more information about this conference click here.


August 13, 2015
8:30 a.m.


Portland Marriott Downtown Waterfront - Speakers: Kelly Hagan and JoAnn Kohl