Attention:
Card image cap

Armed and Ready: Strengthening Your Defense Against the Next Wave of Third-Party Cybersecurity Threats


Level: Intermediate
Runtime: 61 minutes
Recorded Date: April 16, 2024
Click here to share this program
Printer-Friendly Version
Closed Caption

Agenda

  • What is a Third Party Risk?
  • What Does a Third Party Risk Management Program Entail?
  • Privacy and Security Laws
  • U.S. State Comprehensive Privacy Laws
  • CCPA
  • Takeaways

For NY - Difficulty Level: Both newly admitted and experienced attorneys

Description

Third-party cyber risk refers to the potential vulnerabilities and threats that arise from external entities. The risk of vendor data breaches has skyrocketed given the ever-expanding amount of data shared between providers, and it is important that your organization is able to defend against any entity that has your data. In this session, our expert speakers will discuss the key plans they’ve introduced to their suppliers to ensure the appropriate levels of cybersecurity and protection are maintained and the correct monitoring protections are in place to identify vulnerabilities quickly and early.

Provided By

General Counsel Conference
Card image cap

Panelists

Card image cap

Bill Hardin

Vice President
Charles River Associates

Bill has worked on over a thousand data incident/data breach cases along with numerous cases dealing with white collar crime and enterprise risk management. He has handled all types of ransomware, data extortion, business email compromise, nation state attacks, malware outbreaks, insider threats, amongst other items. Many of his cases have been mentioned in The Wall Street Journal, Financial Times, Forbes, and Krebs on Security, amongst other publications. With a background in finance, operations, and software development, he brings valuable insights to clients from multiple dimensions.
In addition to his forensic engagement assignments, Bill has served in numerous interim management roles for organizations experiencing disruption. He has assisted companies with various management consulting assignments pertaining to strategy, operations, and software implementations.
Bill is a Certified Public Accountant (CPA)/CFF, Certified Fraud Examiner (CFE), and a certified Project Management Professional (PMP). He has spoken at numerous events on cybercrime, risk management, and strategy/operations consulting. He serves on the board for Legal Prep Charter Schools and is an adjunct professor at DePaul University in Chicago.

Card image cap

John Meyer

General Counsel & Chief Privacy Officer
Zeem Solutions, Inc.

John B. Meyer is General Counsel, Chief Privacy Officer and Corporate Secretary for Zeem Solutions, a leader in fleet electrification services and infrastructure. As part of Zeem Solutions’ senior leadership, John manages teams that oversee the company’s intellectual property portfolio, and provide pre-litigation dispute resolution, strategic legal advice and transactional support for Zeem Solutions’ “fleet-as-a-service” initiatives, procurement, and nationwide charging depot expansion efforts. He also serves as legal advisor and subject matter expert to the board of directors and senior management on data security and privacy regulations, policy and compliance, and leads the company’s data protection and privacy compliance programs.
John is a Certified Information Privacy Professional for both the US and Europe (CIPP/US, CIPP/E). He received his JD from the University of Missouri, and his Masters’ of Science in Cybersecurity Risk and Strategy from NYU’s School of Law and Tandon School of Engineering.


Card image cap

Similar Courses

Card image cap
64 minutes
"I Am Not a Cat" Proceedings in a Virtual World
Besides becoming a pop-culture catchphrase, how has the shift to a virtual environment impacted proceedings over the last year, and what changes do you believe are here to stay? Our panel of experts will examine some of the greatest challenges, faux pas, and successes in virtual proceedings over the course of this transformative time.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
63 minutes
2021: The Year of the ELM
Panelists will clarify what constitutes an ELM platform, examine its unique and compelling capabilities, and discuss its strategic and tactical advantages, particularly those stemming from data-driven insights and machine-driven decision making. Attendees will gain a clear understanding of the significance of the emergence of ELM solutions, what firms and law departments can achieve with ELM platform, and practical and ethical considerations related to adopting an ELM solution.

Legalweek

$65

Add to Cart
Card image cap
118 minutes
A Comprehensive Guide on Non-Fungible Tokens (NFTs): Managing Potentials and Perils
In this program, a panel of thought leaders and practitioners assembled by The Knowledge Group will discuss the recent trends and significant challenges surrounding NFTs and the associated legal landscape, including helpful insights to avoid potential risks.">In this program, a panel of thought leaders and practitioners assembled by The Knowledge Group will discuss the recent trends and significant challenges surrounding NFTs and the associated legal landscape, including helpful insights to avoid potential risks.

The Knowledge Group

$165

Add to Cart
Card image cap
85 minutes
A Practical Guide in Drafting Data Privacy and Security Agreements: Mitigating Data Security Breach Risks
Listen as experienced data security attorneys Kenneth Dort (Faegre Drinker Biddle & Reath LLP) and Melissa Krasnow (VLP Law Group LLP) provide a comprehensive discussion of the latest trends, developments, and critical issues surrounding data privacy and security agreements. They will, among other things, offer practical tips and strategies for drafting these provisions in light of recent developments and the current legal landscape.

The Knowledge Group

$115

Add to Cart
Previous Next