National Conference on Cybersecurity Law & Compliance - DS

Page 1

The only practical, comprehensive cybersecurity event for the legal and compliance community.

Conference Co-Chairs

John P. Carlin Partner

Paul, Weiss, Rifkind, Wharton & Garrison LLP

Former Assistant Attorney General, National Security Division U.S. Department of Justice

Trâm Phi General Counsel Databricks

Sam Singer Chief Counsel, Cyber Boeing

Miriam H. Wugmeister Partner Morrison Foerster LLP

National Conference on

Cybersecurity LAW & COMPLIANCE

February 28 & 29, 2024 • The Madison Hotel, Washington, DC

Join the legal and compliance community at this unprecedented conference on the most pressing, high stakes issues, including:

Angle-Right SEC Rules in Practice: Agency Expectations for Complying with the New Cyber Incident Breach Disclosure Rules –From Meeting the 4-Day Deadline and Beyond

Angle-Right Navigating the Complex Web of Federal, State and Foreign Laws and Regulations – and the Core Elements of a Global Cyber Compliance Program

Angle-Right Embedding Cybersecurity Into Your Critical Infrastructure Security and Resilience Policy: Concrete Examples and Lessons Learned

Angle-Right Case Study! Lessons from Weathering a Cyber Breach: Building a Resilient Cybersecurity Framework and Response Action Plan, and Working with the FBI

Angle-Right Generative AI and Cyber Risk Assessment and Mitigation: Evaluating How Your Organization is Vulnerable and How to Safeguard Against Artificial Intelligence Hacks

Supporting Sponsor

Associate Sponsors

REGISTER NOW AmericanConference.com/Cyber-Security-Law • 888 224 2480 a C5 Group Company Business Information in a Global Context
EARN CLE CREDITS

With so much at stake, ensure your organization’s cyber program is fully incorporating (and reconciling) a complicated web of federal, state and international requirements. Assess whether or not your organization is equipped to satisfy SEC, FTC and more agencies’ expectations.

Join ACI’s National Conference on Cybersecurity Law & Compliance – the country’s only practical, comprehensive event for the legal and compliance community.

Angle-Right Q&A State Legislative Panel: Cyber and Privacy Updates

Angle-Right Global Compliance: Reconciling U.S. and International Regulations

Angle-Right In-House Perspectives: Updating and Implementing Your Cyber Risk Management Strategy for Meeting Agencies Expectations

Angle-Right Plaintiff Attorney Insights: Examining New, Emerging Litigation Trends

hands-helping BECOME A SPONSOR

With conferences in the United States, Europe, Asia Pacific, and Latin America, the C5 Group of Companies: American Conference Institute, The Canadian Institute, and C5 Group, provides a diverse portfolio of conferences, events and roundtables devoted to providing business intelligence to senior decision makers responding to challenges around the world.

Don’t miss the opportunity to maximize participation or showcase your organization’s services and talent. For more information please contact us at: SponsorInfo@AmericanConference.com

CONTINUING LEGAL EDUCATION CREDITS

EARN CLE CREDITS

Accreditation will be sought in those jurisdictions requested by the registrants which have continuing education requirements. This course is identified as nontransitional for the purposes of CLE accreditation.

ACI certifies this activity has been approved for CLE credit by the New York State Continuing Legal Education Board.

ACI certifies this activity has been approved for CLE credit by the State Bar of California.

ACI has a dedicated team which processes requests for state approval. Please note that event accreditation varies by state and ACI will make every effort to process your request.

Questions about CLE credits for your state? Visit our online CLE Help Center at www.AmericanConference.com/Accreditation/CLE/

WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION 2 | LINKEDIN American Conference Institute

COMPLIMENTARY WEBINAR:

Preparing for the SEC Cybersecurity Disclosure Rules

Wednesday, December 6, 2023  •  1:00 PM – 2:00 PM EST

REGISTER NOW

John P. Carlin Partner

Paul, Weiss, Rifkind, Wharton & Garrison LLP

Former Assistant Attorney General, National Security Division, U.S. Department of Justice

Miriam H. Wugmeister Partner

Morrison Foerster LLP

Beginning December 18, 2023, the U.S. Securities and Exchange Commission (SEC) will require companies to disclose material cybersecurity incidents within four days, and adopt annual reporting regarding their cybersecurity risk management, strategy and governance. The new SEC rules will come into effect amid further requirements from other agencies and intensifying enforcement by the Federal Trade Commission (FTC).

Is your organization truly ready to meet the SEC’s new cybersecurity disclosure and reporting requirements?

On the heels of the rules coming into effect, attend this complimentary webinar to gain further clarity and actionable takeaways on high stakes issues, including:

• What is the SEC’s expectation for incident reporting within four days, and specifically the expectation for a Form 8-K and Form 10-K filing

• Defining a “material” cybersecurity incident as reaching a threshold reasonable investors consider important to their decision-making

• Updating initial reporting, and what is expected in follow-up reports

• Assessing the incident effects, remediation efforts, cyber insurance impacts, and estimated costs of a breach

REGISTER NOW AmericanConference.com/Cyber-Security-Law • 888 224 2480 a C5 Group Company Business Information in a Global Context

Distinguished Faculty

CONFERENCE CO-CHAIRS

John P. Carlin

Partner, Paul, Weiss, Rifkind, Wharton & Garrison LLP

Former Assistant Attorney General, National Security Division U.S. Department of Justice

Trâm Phi

General Counsel Databricks

Sam Singer Chief Counsel Cyber Boeing

Miriam H. Wugmeister Partner Morrison Foerster LLP

GOVERNMENT REPRESENTATIVES

Lauren Boas Hayes

Senior Advisor for Technology and Innovation

Cybersecurity and Infrastructure Security Agency (CISA)

Nikki R. Harding

Deputy Assistant Administrator of Compliance – Security Operations Transportation Security Administration (TSA)

Todd Hemmen

Cyber Technical Analytics and Operations Section, Cyber Division Federal Bureau of Investigation (FBI)

Dave Hirsch

Chief, Crypto Assets and Cyber Unit, Division of Enforcement

U.S. Securities and Exchange Commission

Kathy Konieczny

Assistant General Counsel for Energy Delivery and Resilience U.S. Department of Energy

Dr. David Mussington

Executive Assistant Director for Infrastructure Security Cybersecurity and Infrastructure Security Agency (CISA)

Jesse Sloman

Deputy Chief Cyber Officer for Operations State of New York, New York State Executive Chamber

Alejandro Rosenberg

User-Alt

Attorney, Division of Privacy and Identity Protection, Federal Trade Commission

Christopher Terranova Senior Trial Counsel U.S. Department of Justice, Civil Division, Fraud Section

Bryan A. Vorndran Assistant Director, Cyber Division Federal Bureau of Investigation (FBI)

IN-HOUSE FACULTY

Joanna Baltes

Assistant General Counsel

Cybersecurity & Privacy Exelon

Benjamin Benhan

Privacy, Data Governance & Cybersecurity Attorney eBay

William Bracker

Senior Corporate Counsel, Privacy Cox Communications

Melissa Causey Chai

Cyber Product Development Lead AIG

Nadia Hoyte

Partner, National Practice Cyber Lead USI Insurance Services

User-Alt

Ali Karshan

Managing Director, General Counsel for Cybersecurity Citigroup Inc.

Benjamin Kastan

Senior Counsel for Data Protection and Cybersecurity Visa

Sandeep Kathuria

Assistant General Counsel (Cybersecurity and Government Contracts) L3Harris

Alexandria Lutz

Senior Corporate Counsel – Privacy Nordstrom Inc.

Laurie J. Mandell

Assistant Vice President, Cyber Claims, North America Financial Lines Chubb

Rachael Pashkevich Koontz

Senior Corporate Counsel, Cybersecurity Compliance T-Mobile

Richard Peterson

Senior Corporate Counsel, Security & Trust Cisco

Johnathan Rudy Senior Counsel, Cybersecurity, Data Protection, Privacy, TransUnion

Kimberly Udovic Vice President, Assistant General Counsel, Regulatory Toyota Motor North America Inc.

Emily Voorheis VP & Corporate Counsel, Law Department Marriott International

Igor Volovich Vice President of Compliance Strategy Qmulos

Joseph Whitehead Senior Corporate Counsel, Information Security, Government Contracts, Operations Northrop Grumman Corporation

OUTSIDE COU NSEL FACULTY

Julie K. Bracker Partner Bracker & Marcus LLC

Charu Chandrasekhar Partner, Debevoise & Plimpton Former, Assistant Regional Director, Division of Enforcement U.S. Securities and Exchange Commission

Elizabeth R. Dill Partner Mullen Coughlin LLC

Brian Lichter Vice President Stroz Friedberg

Stephen Lilley Partner, Cybersecurity & Data Privacy Mayer Brown LLP

Colman McCarthy Partner

Shook Hardy & Bacon LLP

Lynn Neils Partner Foley Hoag LLP

Paul Otto Partner, Privacy and Cybersecurity Hogan Lovells US LLP

James J. Pizzirusso Partner Hausfeld LLP

Sabita J. Soneji Partner

Tycko Zavareei LLP

Lisa J. Sotto Partner

Hunton Andrews Kurth LLP

Julia Tama Partner Venable LLP

Daniel S. Wolf Director of Cybersecurity Services Venable LLP

4 | LINKEDIN American Conference Institute WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION

APre-Conference Workshops: Tuesday, Feb. 27, 2024

9:00–12:30 (Registration Opens 8:30 a.m.)

A Deep Dive into the Complex Web of Federal and State Cyber and Privacy Laws and Regulations – and the Core Elements of a Cyber Compliance Program

There are approximately 11 states with a comprehensive cyber and data privacy law, including California, Virginia, Connecticut, Colorado, Utah, Iowa, Indiana, Tennessee, Oregon, Montana and Texas. Plus, in 2022-2023, 16 states introduced privacy bills to address concerns, including biometric identifiers and health data.

This session will provide a roadmap to the different privacy and cybersecurity laws across the country and a status report on their expected implementation, comment periods and proposal stages.

In addition to speaker-prepared reference materials, attendees will also benefit from smaller-group discussion and extended Q&A.

Topics will include:

• California: California Consumer Privacy Act (2018)

• Colorado: Colorado Privacy Act (CPA) (2021)

• Connecticut: Senate Bill – An Act Concerning Artificial Intelligence, Automated Decision-Making and Personal Data Privacy (2023)

• New York State: Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)(2020)

• Texas: Texas Data Privacy and Security Act (2023)

• Virginia: Virginia Consumer Data Protection Act (VCDPA)

Benjamin Kastan

Senior Counsel for Data Protection and Cybersecurity Visa

Alexandria Lutz

Senior Corporate Counsel – Privacy Nordstrom Inc.

Colman McCarthy Partner Shook Hardy & Bacon LLP

REGISTER NOW AmericanConference.com/Cyber-Security-Law • 888 224 2480 a C5 Group Company Business Information in a Global Context WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION

B1:30–5:00 (Registration Opens 1:00 p.m.)

Document Swap: A Practical Guide to Cyber and Incident Response Policies and Crisis Management

PART ONE: Document Swap – Revising Your Incident Response Legal Cyber Policy

Ensure your cyber incident response policy is covering all the necessary components. During this interactive session, delegates will work through policy drafts, discussing their strengths and weaknesses, and grey areas. Policies will be evaluated based on whether they are realistic, attainable and compliant.

• Policies for information security, including defining access management, who has access to information, which information, and under what circumstances

• Mapping your data breach management plan and Incident Response Plan

• Defining technical teams in charge of patch management and maintenance

• Policies for Employee Devices, Acceptable Use and Security Policy

• Delineating device security measures, including prohibited applications on personal devices

PART TWO: Testing Your Cyber Incident Response Action Plan

How would you and your organization respond to a cyber breach? Join this interactive segment with hypothetical scenarios to work through expected and lesser-known scenarios, actions and outcomes.

• Recognizing and shutting down a cyber attack

• Determining the severity of the breach

• Identifying the source of the breach

• Examining the logical flow of events for incident response

• Actualizing the flow of communication and decision-making at each stage

• Analyzing the strategies and motivations of threat actors

• Understanding the role of government agents in a ransomware investigation, including investigating threats to national security

• Communicating with victims and cooperating with authorities, including subpoenas and search warrants

William Bracker

Senior Corporate Counsel, Privacy Cox Communications

Johnathan Rudy

Senior Counsel, Cybersecurity, Data Protection, Privacy, TransUnion

Elizabeth R. Dill Partner Mullen Coughlin LLC

6 | LINKEDIN American Conference Institute WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION

Main Conference Day One: Wednesday, Feb. 28, 2024

7:30 Registration & Breakfast

8:45 Opening Remarks from the Co-Chairs

John P. Carlin Partner, Paul, Weiss, Rifkind, WhartoN & Garrison LLP

Former Assistant Attorney General, National Security Division U.S. Department of Justice

9:00 FIRESIDE CHAT WITH

Morrison Foerster LLP

Dave Hirsch

Chief, Crypto Assets and Cyber Unit, Division of Enforcement U.S. Securities and Exchange Commission

9:45 SEC RULES IN PRACTICE: Expectations and Compliance with the New Cyber Disclosure Rules for Meeting the 4-Day Deadline and Beyond

Under the SEC’s newly adopted cybersecurity risk management rules, public companies are now required to disclose a cyber breach publicly and within four days.

This session will unpack the practical implications of the rules and key missteps to avoid:

• SEC’s expectations for incident reporting within four days, and specifically the expectation for a Form 8-K and Form 10-K filing

• Updating initial reports, and what is expected in follow-up reports

• Defining a “material” cybersecurity incident as reaching a threshold reasonable investors consider important to their decision-making

• Assessing the incident effects, remediation efforts, cyber insurance impacts, and estimated costs of a breach

10:45 Networking Break

Joanna Baltes Assistant General Counsel Cybersecurity & Privacy Exelon

Ali Karshan Managing Director, General Counsel for Cybersecurity Citigroup Inc.

Charu Chandrasekhar Partner

Debevoise & Plimpton

Former, Assistant Regional Director, Division of Enforcement U.S. Securities and Exchange Commission

REGISTER NOW AmericanConference.com/Cyber-Security-Law • 888 224 2480 a C5 Group Company Business Information in a Global Context WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION
Miriam H. Wugmeister Partner Sam Singer Chief Counsel Cyber Boeing Trâm Phi General Counsel Databricks

11:15 Embedding Cybersecurity Into Your Critical Infrastructure Security and Resilience Policy: Concrete Examples and Lessons Learned

This session will examine how cyber should be incorporated into critical infrastructure security and resilience policy. The current policy covers 16 critical infrastructure sectors which are considered vital to US security, national economic security and national public health or safety.

• Defining critical infrastructure, how it applies to different sectors and how it may be redefined under updated policy

• Examining CISA’s role to support state and industry partners

• Identifying essential workers needed to maintain services and functions for American’s daily functions

• Hypothesizing potentially debilitating national security, economic, public health or safety consequences of a cyber breach and safeguarding against this possibility

• Examining reporting requirements following a breach

12:30 Networking Luncheon

Nikki R. Harding Deputy Assistant Administrator of Compliance – Security Operations Transportation Security Administration (TSA)

Kathy Konieczny Assistant General Counsel for Energy Delivery and Resilience U.S. Department of Energy

Sam Singer Chief Counsel, Cyber Boeing

Joseph Whitehead

Senior Corporate Counsel, Information Security, Government Contracts, Operations Northrop Grumman Corporation

Dr. David Mussington Executive Assistant Director for Infrastructure Security

Cybersecurity and Infrastructure Security Agency (CISA)

1:45 CASE STUDY: Lessons from a Cyber Breach and Working with the FBI: How to Know If Your Cybersecurity Framework and Response Action Plan Are Effective and Resilient

Hear directly from leading counsel who have advised on some of the most significant cyber breaches and delve into the critical – and unexpected – steps that were taken to identify, communicate and repair the breach damage.

• Communicating with the FBI, including timelines

• Examining the hack tactics, trends and how vulnerabilities are being exploited

• Reviewing timelines of a breach and lessons learned

John P. Carlin

Partner, Paul, Weiss, Rifkind, WhartoN & Garrison LLP

Former Assistant Attorney General, National Security Division U.S. Department of Justice

Lisa J. Sotto Partner Hunton Andrews Kurth LLP

Bryan A. Vorndran

Assistant Director, Cyber Division Federal Bureau of Investigation (FBI)

8 | LINKEDIN American Conference Institute WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION

2:45 IN-HOUSE PANEL: Updating and Implementing Your Cyber Risk Management and Strategy – The Finer Points of Meeting Agencies Expectations

• Developing a cybersecurity risk management strategy to identify material risks, assess potential impacts, and detail efforts to manage them

• Establishing and documenting cybersecurity policies and procedures and reviewing annually

• Disclosing whether a company has designated a cybersecurity expert at the board level

• Reporting when a board member, board committee, or other governance body within the company has oversight of cybersecurity

• Considering cyber expertise when assembling the board of directors

• Incorporating cybersecurity disclosure into proxy statements and annual reports

3:30 Networking Break

3:45 Q&A State Legislative Panel: Cyber and Privacy Updates

Hear directly from state legislative representatives as they discuss how cybersecurity measures are being incorporated into state laws. Discuss how state laws work in concert with federal laws and regulations and where there are gaps. Join this an interactive Q&A session.

4:15 Cross-Agency Interview: Coordinating Cyber Responses

5:00 Conference Adjourns

Sandeep Kathuria Assistant General Counsel (Cybersecurity and Government Contracts)

L3Harris

Richard Peterson Senior Corporate Counsel, Security & Trust Cisco

Kimberly Udovic Vice President, Assistant General Counsel, Regulatory Toyota Motor North America Inc.

Igor Volovich Vice President of Compliance Strategy Qmulos

Daniel S. Wolf Director of Cybersecurity Services Venable LLP

Jesse Sloman Deputy Chief Cyber Officer for Operations State of New York, New York State Executive Chamber

Lauren Boas Hayes Senior Advisor for Technology and Innovation Cybersecurity and Infrastructure Security Agency (CISA)

Brian Lichter Vice President Stroz Friedberg

REGISTER NOW AmericanConference.com/Cyber-Security-Law • 888 224 2480 a C5 Group Company Business Information in a Global Context WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION
Media Partners

Main Conference Day Two: Thursday, Feb. 29, 2024

7:30 Registration Opens

8:35 Opening Remarks from the Co-Chairs

John P. Carlin

Partner, Paul, Weiss, Rifkind, Wharton & Garrison LLP

Former Assistant Attorney General, National Security Division U.S. Department of Justice

Miriam H. Wugmeister Partner

Morrison Foerster LLP

Sam Singer Chief Counsel Cyber Boeing

Trâm Phi General Counsel Databricks

8:45 Early Riser Session: Generative AI and Cyber Risk Assessment and Mitigation – Evaluating How Your Organization is Vulnerable and How to Safeguard Against Artificial Intelligence Hacks

Enjoy breakfast and join this highly anticipated, early riser session! Examine how the surge in Generative Artificial Intelligence usage is affecting cybersecurity and national security. Ensure that you are up-to-speed on the emergence of deep fakes being used to trick employees, and how generative AI is being used to sift through line codes to find organizational vulnerabilities. Learn how to safeguard against emerging AI risks as you update your cyber program.

• Examining how AI will interpret malicious actors versus imbedded bias

• Using AI red and blue teams to determine weaknesses in your system

• Debating the dangers of using generative AI as part of a cybersecurity system, including incorrect information

9:30 Unpacking FTC Enforcement Trends and Updates—and Their Practical Impact

• The False Claims Act and qui tam enforcement, including discussion of early cases under the Department of Justice’s Cyberfraud Initiative

• Investigation into OpenAI, creator of ChatGPT, and the potential that the chatbot has caused consumer harm through data collection

• First time enforcement action under FTC’s Health Breach Notification Rule, with a look at GoodRx Holdings Inc.

• Putting health-app companies “on notice” to protect consumer data privacy, with a look at the Amazon acquisition of One Medical

• Settlement with Easy Healthcare Corporation

10:30 Networking Break

User-Alt

Benjamin Benhan Privacy, Data Governance & Cybersecurity Attorney eBay

Stephen Lilley Partner, Cybersecurity & Data Privacy Mayer Brown LLP

Julie K. Bracker Partner Bracker & Marcus LLC

Alejandro Rosenberg Attorney, Division of Privacy and Identity Protection, Federal Trade Commission

Julia Tama Partner Venable LLP

Christopher Terranova Senior Trial Counsel U.S. Department of Justice, Civil Division, Fraud Section

10 | LINKEDIN American Conference Institute WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION

10:45 Polling and Hypothetical Scenarios: Would You or Wouldn’t You? Deciding Whether or Not to Pay Ransomware –Legal, Business and More Practical Considerations

Through a review of real-life and hypothetical cases, audience members will benefit from concrete examples of how to navigate the question of paying ransomware-and the risks and aftermath.

• The pros and cons of paying ransomware

• Making the right call: Key factors guiding the decision to pay ransomware-or not

• Analyzing the strategies and motivations threat actors use for a ransomware attack

• The role of government agents in a ransomware investigation, including investigating threats to national security

• Communicating with victims, including voluntary cooperation, subpoenas and search warrants

Miriam H. Wugmeister Partner Morrison & Foerster PPL

Melissa Causey Chai Cyber Product Development Lead AIG

Todd Hemmen Cyber Technical Analytics and Operations Section, Cyber Division Federal Bureau of Investigation (FBI)

11:30 The Big Debate & Hypothetical Scenarios: Determining When (and When Not) an Incident is “Material”

Under the New SEC Rules–and

Evaluating Liability Risk for Material Misrepresentation

Delegates are invited to join this dynamic session to work through hypothetical scenarios and a debate between speakers on what is “material” in the context of a breach. Via our anonymous audience polling system, audience members will be able to ick the winner!

• Determining what is a “material” breach under Form 8-K standards for a cyber incident

• Defining what is an “incident” and whether it needs to be reported and to whom

• Determining how much to disclose, what is material to the breach, and the Affirmative Disclosure Rule

• Who determines what is material within your organization and the process and criteria for assessing what is material

• Determining whether a shareholder would consider the incident important in making an investment decision

• When to “start the clock” for complying with the SEC reporting deadlines

• Mapping communication standards within the company and to stakeholders

• What is privileged information that cannot be disclosed

• What constitutes disclosing the whole breach, and what are grey areas

• What can emerge during discovery and potentially lead to litigation

• Regulatory implications of not providing a full disclosure

12:30 Networking Luncheon

Lynn Neils Partner Foley Hoag LLP

Paul Otto Partner, Privacy and Cybersecurity Hogan Lovells US LLP

1:45 Cyber Compliance Program Benchmarking Session—from Organizational Structure to Reporting and More

• What is the industry standard, and what are reasonably good cybersecurity standards

• Implementing a compliance program and keeping up with annual reporting standards

• Organizational structure, working effectively with cross-functional teams including compliance, legal and tech departments

Rachael Pashkevich Koontz Senior Corporate Counsel, Cybersecurity Compliance T-Mobile

Emily Voorheis VP & Corporate Counsel, Law Department Marriott International

REGISTER NOW AmericanConference.com/Cyber-Security-Law • 888 224 2480 a C5 Group Company Business Information in a Global Context WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION

2:30 Plaintiff Attorneys Panel: Takeaways from Recent Cases and Emerging Trends

• Developments in Standing in Data Privacy Cases

• Developments in Damages in Data Privacy Cases

• Healthcare Ransomware Attacks and Resulting Class Actions

• Settlements in Data Breach Class Actions

James

Sabita

3:15 Trends in Cyber Insurance: How Limitation of Liability and Indemnity Clauses Are Evolving

• Analyzing the impact of cyber insurance on your business

• Reviewing the types of disclaimers that are now being used – what is and is not covered

• Examining how insurance claims are being handled

• How is a cyber insurance claim different than other claims

• What is covered under the scope of Indemnity?

• Coverage of ransomware paid by the customer

• Costs of investigating and remediating the breach

• Regulatory fines as a result of a cyber incident - and the impact on insurance coverage

4:00 Closing Remarks by the Conference Co-Chairs, Conference Concludes

Laurie

C5 celebrates 40 years of excellence! We are thrilled to have provided exceptional conference experiences globally with our outstanding team, speakers, sponsors, partners, and attendees. To mark this milestone, we're launching a new logo which represents our commitment to innovation, growth, and excellence, represented by the five Cs of C5: Current, Connected, Customer-Centric, Conscientious, and Committed.

Looking back on 40 years, we are grateful for our achievements—hosting global conferences, uniting industry leaders, and supporting business growth. However, we are not done yet! We are committed to pushing boundaries and creating impactful experiences and we're excited for the next 40 years of success.

SUPPORTING SPONSOR

Venable is a firm of trusted advisors serving businesses, organizations, and individuals in many of the most important aspects of their work. Our

virtually every industry and all areas of regulatory and government affairs, corporate and business law, intellectual property, and complex litigation.

delivering services around the world, we help clients connect quickly and effectively to the experience and insights key

12 | LINKEDIN American Conference Institute WHY ATTEND WEBINAR FACULTY WORKSHOPS CONFERENCE DAY ONE CONFERENCE DAY TWO VENUE & REGISTRATION
Hoyte Partner, National Practice
Lead
Insurance Services
Nadia
Cyber
USI
J. Mandell Assistant Vice President, Cyber Claims, North America Financial Lines
User-Alt
Chubb
With more than 900 professionals
most pressing objectives. Join Our Email List to Stay Connected SIGN UP TO RECEIVE EXCLUSIVE DISCOUNTS, OFFERS AND PROGRAM UPDATES AmericanConference.com/join-our-email-list/ 
capabilities span
to achieving their
J. Pizzirusso Partner Hausfeld LLP
J. Soneji
Zavareei
Partner Tycko
LLP
CONFERENCE WORKSHOPS A: A Deep Dive into the Complex Web of Federal and State Cyber and Privacy Laws and Regulations B: Document Swap PRICING $2395 $600 each $2495 © American Conference Institute, 2023 Special Discount ACI offers financial scholarships for government employees, judges, law students, non-profit entities and others. For more information, please email or call customer service. To update your contact information and preferences, please visit https://www.AmericanConference.com/preference-center/. Terms & conditions and refund/cancellation policies can be found at AmericanConference.com/company/faq/ All program participants will receive an online link to access the conference materials as part of their registration fee. Additional copies of the Conference Materials available for $199 per copy. Register & Pay after February 9, 2024 Register & Pay by February 9, 2024 *Team/group registrations must be from the same organization/firm and register together in one transaction. Bringing a Team?* 3–4 10% Conference Discount 5–6 15% Conference Discount 7 20% Conference Discount 8+ Call 888-224-2480 Venue Information THE MADISON HOTEL 1177 15th Street NW, Washington, DC, 20005 PHONE : 1-877-532-7984 ACCOMMODATIONS American Conference Institute is pleased to offer our delegates a limited number of hotel rooms at a negotiated rate. To take advantage of these rates, please contact the hotel directly and quote “ACI’s Cybersecurity Law & Compliance Feb 2024”. Please note that the guest room block cut-off date is February 6, 2024. After that date OR when the room block fills, guestroom availability and rate can no longer be guaranteed. Looking to Register? Contact our Customer Service Representatives: Dan Manganiello, American Conference Institute D.Manganiello@AmericanConference.com 1 212 352 3220 x5464 Use Registration Code: B00-999-DMO23   Gonzalo Dounis, American Conference Institute G.Dounis@AmericanConference.com 1 212 352 3220 x7536 Use Registration Code: B00-999-GDS23   CONFERENCE CODE: 677L24-WAS BOOK WITH CONFIDENCE! Register and pay to lock in your early rate and be eligible for a full refund until Feb. 16, 2024. If you are unable to attend for any reason, you will have the following options: y A full credit note for you, or a colleague to attend another event. y A full refund. All cancellations and changes must be submitted to CustomerService@AmericanConference.com by Feb. 16, 2024. WORRY FREE Registration GUARANTEE

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.