2nd National Conference on Cybersecurity Law & Compliance - WEB

Page 1


2nd National Conference on

Cybersecurity LAW & COMPLIANCE

January 29–30, 2025 • Hilton Towers Arlington, VA

The only practical, comprehensive cybersecurity event for the legal and compliance community.

Key Enforcement Updates From:

Jorge G. Tenreiro

Deputy Chief, Crypto Assets and Cyber Unit, Division of Enforcement

U.S. Securities and Exchange Commission

2025 Co-Chairs:

Adam Cohen

Senior Director, Associate General Counsel for Cybersecurity Capital One

Joseph Whitehead

Senior Corporate Counsel, Cyber & Privacy

Northrop Grumman Corporation

Charu Chandrasekhar Partner

Debevoise & Plimpton LLP

Former Assistant Regional Director, SEC Division of Enforcement

Alejandro Rosenberg Attorney, Division of Privacy and Identity Protection Federal Trade Commission

Terry Kalka Director DC3 DCISE

Benefit from legal, compliance, risk management and incident response strategies, including:

‹ The SEC DISCLOSURE RULE and MATERIALITY: Trends in Filings, Holding Statements and the Aftermath

‹ CASE STUDIES Led by Prudential, Wells Fargo and Marriott: Lessons Learned from a Cyber Breach

‹ EU CYBER COMPLIANCE: How to Satisfy DORA, NIS2 and More EU Requirements

‹ CRITICAL INFRAUSTRUCTURE Security and Resilience: Industry Requirements and the Current Status of the CIRCIA Rule

‹ BUSINESS CONTINUITY IN A CRISIS: Crafting the Message to the Board, Employees, Media and Beyond

‹ AI RISK AND THE INTERPLAY WITH CYBER: Implementing AI Policy with a Risk Management Function

‹ CYBER INSURANCE: The Lengths and Limits of Coverage, Cost and Privilege Supporting Sponsor

With so much at stake, ensure your organization’s cyber program is fully incorporating (and reconciling) a complicated web of federal, state and international requirements.

Assess whether or not your organization is equipped to satisfy SEC, FTC and more agencies’ expectations.

Join ACI’s 2nd National Conference on Cybersecurity Law & Compliance Conference – the country’s only practical, comprehensive event for the legal and compliance community.

Learn from participating organizations, including:

• Agricultural Bank of China, New York Branch

• BAE Systems

• Boeing

• Cisco Systems

CLE CREDITS

• Citigroup

• Hudson Insurance Group

• IBM

• Marriott International

Benefits of attending:

• Prudential Financial

• RTX Corporation

• Spire Global

• Wells Fargo Bank

HEAR directly from government representatives about policy, compliance and enforcement actions

GAIN the latest practical and actionable strategies for incident response

LEARN how to vet third party business partners and secure your supply chain

NETWORK with cross-sector corporate executives and benchmark with your peers

Accreditation will be sought in those jurisdictions requested by the registrants which have continuing education requirements. This course is identified as nontransitional for the purposes of CLE accreditation.

ACI certifies this activity has been approved for CLE credit by the New York State Continuing Legal Education Board.

ACI certifies this activity has been approved for CLE credit by the State Bar of California.

ACI has a dedicated team which processes requests for state approval. Please note that event accreditation varies by state and ACI will make every effort to process your request.

For more information on ACI’s CLE process, visit: www.AmericanConference.com/Accreditation/CLE

Faculty

CONFERENCE CO-CHAIRS

Adam Cohen

Senior Director, Associate General Counsel for Cybersecurity Capital One

Joseph Whitehead

Senior Corporate Counsel, Cyber & Privacy Northrop Grumman Corporation

Charu Chandrasekhar Partner

Debevoise & Plimpton LLP

Former Assistant Regional Director, Division of Enforcement and Chief U.S. Securities and Exchange Commission

GOVERNMENT SPEAKERS

Eun Young Choi

Deputy Assistant Attorney General, National Security Division U.S. Department of Justice

Alejandro Rosenberg Attorney, Division of Privacy and Identity Protection Federal Trade Commission

Terry Kalka Director DC3 DCISE

Jorge G. Tenreiro

Deputy Chief, Crypto Assets and Cyber Unit, Division of Enforcement U.S. Securities and Exchange Commission

INDUSTRY REPRESENTATIVES

Billee Elliott McAuliffe

Member & Data Protection Practice Group Leader Lewis Rice LLC

Joanna Baltes

Chief Cybersecurity Counsel, Americas IBM

Guillermo S. Christensen Partner K&L Gates LLP

Michael Court

Deputy General Counsel Agricultural Bank of China, New York Branch

Monique Ferraro Cyber Counsel HSB

Jonathan Gannon

Chief Cyber and Privacy Counsel, Chief Privacy Officer GE Vernova

Chris Hale

Senior Director and Associate General Counsel for Cyber and National Security Cisco Systems

Jocelyn J. Hunter

Vice President & Deputy General Counsel The Home Depot

Britt Ide Board Director NorthWestern Energy, PowerGEM LLC, Technosylva

Ali Karshan

Managing Director, General Counsel for Cybersecurity Citigroup Inc.

David Kessler

Vice President & Associate General Counsel, IT & Cybersecurity BAE Systems, Inc.

Sonita Lontoh

Independent Board Director, Member of Audit and Compensation Committees Sunrun TrueBlue Inc.

Emily Lowe

Senior Vice President, Cyber Practice Leader Hudson Insurance Group

Christine Ricci

General Counsel, Global Security & Digital Technology GE Aerospace

Amy Waller Apostol

Assistant General Counsel, Cyber & Emerging Technologies Legal Department Leidos

Alyson Weckstein Tiegel

Assistant General Counsel, Cybersecurity Wells Fargo Bank

Kimberly J. Shur

Senior Vice President, Global Compliance Counsel & Privacy Officer Marriott International Inc.

PRIVATE PRACTICE FACULTY

Marc Rothenberg

Chief Legal Officer, Cybersecurity, Data Privacy, and AI Law Prudential Financial

Mike Serra

Senior Counsel for Cyber and National Security Cisco Systems, Inc.

Sam Singer

Chief Counsel, Cyber Boeing

Viet C. Tran

Senior Director & Associate General Counsel, Cybersecurity RTX Corporation

Lynn M. van Buren

Counsel Spire Global

John P. Carlin

Cybersecurity & Data Protection Practice Group Co-chair and Partner Paul, Weiss

Nathan D. Fisher

Managing Director StoneTurn

Siobhan Gorman

Partner, Cybersecurity, Data & Privacy Global Lead Brunswick Group

Katherine Doty Hanniford Partner, Privacy, Cyber & Data Strategy Practice Alston & Bird LLP

Myriah V. Jaworski Member Clark Hill PLC

Sandeep Kathuria Senior Counsel Ice Miller LLP

Brian Levine

Managing Director, Cybersecurity & Data Privacy EY-Parthenon

David K. Lietz

Senior Partner

Milberg Coleman Bryson Phillips Grossman, LLC

Amy Mushahwar Partner

Lowenstein Sandler LLP

Kimberly Peretti Partner, Co-leader of the Privacy, Cyber & Data Strategy Team Alston & Bird LLP

Kenya Reddy

Attorney

Morgan & Morgan Complex Litigation Group

Pre-Conference Workshops

Tuesday, January 28, 2025

WORKSHOP A  9:00 am–12:30 pm (Registration opens at 8:30 am)

A Roadmap to Building a Cyber Program: Dissecting the Patchwork of Federal, State and Industry Requirements, Including NIST and SEC

Join this interactive session to gain a complete roadmap to the patchwork of federal, state and industry regulations. Under the SEC’s newly adopted cybersecurity risk management rules, public companies are now required to disclose a cyber breach publicly and within four days. This session will unpack the requirements, grey areas, practical implications and key missteps to avoid:

Part One: Federal Regulations

• Setting the highest standard to satisfy government regulations and protect your organization

• Implementing regulations and operationalizing them through policies and procedures

• Clarifying key requirements, including deadlines

Michael Court Deputy

Agricultural Bank of China, New York Branch

Amy Mushahwar Partner

Lowenstein Sandler LLP

• Satisfying SEC’s expectations for incident reporting within four days, and specifically the expectation for a Form 8-K and Form 10-K filing

• Updating initial reports, and what is expected in follow-up reports

• Defining a “material” cybersecurity incident as reaching a threshold reasonable investors consider important to their decision-making

• Assessing the incident's effects, remediation efforts, cyber insurance impacts, and estimated costs of a breach

Part Two: Complying with State, Federal and Industry Specific Requirements

• Identifying what is being regulated, where there are similarities, differences and gaps between the regulations

• Meeting reporting obligations and communicating to the different state regulators

• Determining the impact of regulations on your business operations

Join this interactive segment with hypothetical scenarios to work through expected and lesser-known scenarios, actions and outcomes.

Delve into the essential best practices and strategies for rolling out an effective action plan, and tackling hurdles to incident response:

• Determining the response to an IT issue that doesn’t get raised to the board or senior management

» Identifying what a routine response looks like

» Analyzing the hallmarks of an incident to measure severity and if it amounts to a crisis

• Responding to a progressively more severe situation and ransomware demand

» Recent examples of how (and how not) to respond to a ransomware demand

» Examining what the company policy says, and how it may apply to different situations

» Determining whether or not to pay or not pay ransomware

• Communicating your company’s position when the event goes public

» Analyzing how a cyber incident changes when it becomes public

» How to respond when the company is a consumer facing business

» Responding to media attention and scrutiny

• Implementing a resiliency and redundancy plan

» Implementing the full plan for crisis recovery

» Defining what business continuity looks like-and what needs to change moving forward

Guillermo S. Christensen Partner

K&L Gates LLP

Nathan D. Fisher Managing Director

StoneTurn

Main Conference Day One

Wednesday, January 29, 2025

7:45 Registration & Breakfast

8:45 Opening Remarks from the Co-Chairs

Adam Cohen

Senior Director, Associate General Counsel for Cybersecurity Capital One

Joseph Whitehead

Senior Corporate Counsel, Cyber & Privacy

Northrop Grumman Corporation

Charu Chandrasekhar Partner

Debevoise & Plimpton LLP

Former Assistant Regional Director, Division of Enforcement and Chief

U.S. Securities and Exchange Commission

9:00 FIRESIDE CHAT: What May Be Eligible for a National Security Exception to the 4-Day SEC Deadline

This session will discuss the circumstances under which the U.S. government will grant an exception for a cybersecurity disclosure filing beyond the four-day deadline. AT&T made a delayed disclosure filing, due to “national security and public safety concerns,” in July 2024.

Eun Young Choi

Deputy Assistant Attorney General, National Security Division

U.S. Department of Justice

• Examining when and how the exception applies

• Factors affecting the decision to grant an exception

• How is AI being viewed as a risk and as a compliance tool-and the interplay with national security

9:30 SEC Disclosure Rule and Materiality One-Year In: Trends in the Number and Types of Filings, Holding Statements and the Aftermath

Join this session for a one-year review and status report on how the SEC disclosure rule is working in practice, the compliance expectations and challenges, and the lessons from the past year.

• Overview of what the SEC is seeing in terms of the number of filings, and trends in the numbers

Jorge G. Tenreiro

Deputy Chief, Crypto Assets and Cyber Unit, Division of Enforcement

U.S. Securities and Exchange Commission

• Examining whether companies are satisfying compliance expectations and when companies could be showing more fulsome reporting

• How many “holding statements” are being submitted to say that an incident has occurred, without saying whether it is “material” and how companies have determined materiality

• How different industries have interpreted and applied the rule

• The required level of detail in reporting

10:15 Networking Break

10:30 Keynote Address

The New York State Department of Financial Services announced updated cybersecurity regulations to enhance cyber governance, mitigate risks, and protect New York businesses and consumers from cyber threats – touted as a “first in the nation”. The strategy is in addition to the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)

During this highly anticipated session, benefit from key updates and takeaways that will can help to strengthen your cyber compliance strategy.

11:00 Case Study: Lessons Learned from a Cyber Breach

Hear directly from organizations that have experienced a cyber breach and delve into the critical — and unexpected — steps that were taken to identify, communicate and mitigate the damage.

• Working with the FBI and other authorities

• Examining the hack tactics, trends and how vulnerabilities are being exploited

• Reviewing timelines of a breach, and lessons learned for prevention and incident response

Jocelyn J. Hunter Vice President & Deputy General Counsel The Home Depot

Kimberly J. Shur

Senior Vice President, Global Compliance Counsel & Privacy Officer

Marriott International Inc.

Marc Rothenberg

Chief Legal Officer, Cybersecurity, Data Privacy, and AI Law Prudential Financial

12:00 Networking Luncheon

1:15 Cyber and Corporate Governance: Perspectives from Board Members on Priorities and Expectations

Join this session to learn more about board member cyber security priorities, how best to communicate cyber concerns to board members, and how companies need to interact with the board in accordance with the SEC disclosure rules.

Britt Ide Board Director NorthWestern Energy, PowerGEM LLC, Technosylva

Brian Levine Managing Director, Cybersecurity & Data Privacy EY-Parthenon

Sonita Lontoh Independent Board Director, Member of Audit and Compensation Committees Sunrun TrueBlue Inc.

Moderated by:

John P. Carlin

Cybersecurity & Data Protection Practice Group Co-chair and Partner Paul, Weiss

2:00 BUSINESS CONTINUITY

The

Unspoken Rules for Maintaining Business

Continuity in the Event of a Cyberattack or Disruption

• Assessing how a cyber incident will impact business from a macro lens

• Strategizing how the company will react to a cyber attack and ensuring policies are in place

• Implementing non-tech reliant redundancy systems, and showing you can switch providers

• Anticipating the impact on supply chains, vendors, partners and clients

• Assessing the damage: Determining if you can continue to provide service, pay employees and perform other critical business functions

• Implementing the necessary safeguards to protect from further damage and mitigate the risk of a future incident

• Updating your disaster analysis and recovery plan

• Strengthening your security safeguards and protocols

Joanna Baltes Chief Cybersecurity Counsel, Americas IBM

Adam Cohen Senior Director, Associate General Counsel for Cybersecurity Capital One

Monique Ferraro Cyber Counsel HSB

Amy Waller Apostol Assistant General Counsel, Cyber & Emerging Technologies Legal Department Leidos

3:15 Communicating in a Crisis: Executing a Comprehensive Communication Plan and Controlling the Message to the Board, Employees, Media and Beyond

• Controlling the message internally and externally to the government, to the public, to the board, employees, customers and clients

» Responding to the government reporting agencies in a timely and accurate fashion

» Proactively addressing what a hacker is saying about your company to the media

» Getting the correct team of experts in front of the board to address questions

» Supporting employees who are being exploited by hackers

• Documenting events for reporting purposes

• Coordinating with law enforcement for the response and mediation

• Avoiding negative consequences of not communicating

• Exploring how company culture impacts crisis communication

Ali Karshan

Managing Director, General Counsel for Cybersecurity Citigroup Inc.

Christine Ricci

General Counsel, Global Security & Digital Technology GE Aerospace

Kimberly Peretti

Partner, Co-leader of the Privacy, Cyber & Data Strategy Team Alston & Bird LLP

4:00 Cyber

Insurance: The Lengths and Limits of Coverage from Cost, Scope and Privilege

• Delineating what insurance will and will not cover, including ransomware, property damage and political violence insurance

• Considering options when ransomware is excluded from insurance

• Identifying your company’s weak points and exposure, what insurance type is needed, and covering your assets

• Calculating the cost of company exposure versus the affordability of insurance

• Demystifying key provisions and exemptions in policies—and what they mean in practice

• When to involve insurance brokers in privileged legal counsel discussions

4:45 Closing Remarks from the Conference Co-Chairs

Networking Cocktail Reception

Monique Ferraro Cyber Counsel HSB

Emily Lowe

Senior Vice President, Cyber Practice Leader Hudson Insurance Group

Main Conference Day Two

Thursday, January 30, 2024

8:30 Registration Opens

8:45 Opening Remarks from the Conference Co-Chairs

Adam Cohen

Senior Director, Associate General Counsel for Cybersecurity Capital One

Joseph Whitehead

Senior Corporate Counsel, Cyber & Privacy

Northrop Grumman Corporation

Charu Chandrasekhar Partner

Debevoise & Plimpton LLP

Former Assistant Regional Director, Division of Enforcement and Chief U.S. Securities and Exchange Commission

8:50 Special Update: Evolving Threat Actor Landscape, National Security Risks

• Examining the threat actor landscape, where the threats are coming from, how are they manifesting, and the impact on companies and business

• Gauging the level and intensity of cyber attacks

• Lessons learned from recent cyber incidents including:

» Interactions with the hacking groups Scattered Spider and LockBit

• What are government agencies doing to combat cyber attackers, and has it been effective?

Moderated by:

and Ransomware

Katherine Doty Hanniford Partner, Privacy, Cyber & Data Strategy Practice Alston & Bird LLP

» Paying or not to paying ransomware: Key considerations, including when economic sanctions come into play

» Negotiating with hackers: Best practices

9:15

EU

CYBER COMPLIANCE

How to Satisfy DORA, NIS2 and More EU Requirements: Overcoming Hurdles to Implementation the U.S.

The EU is leading the charge in cybersecurity and US companies need to be bracing for impact. This session will address current and incoming European legislation and regulations that will affect global businesses.

NIS2, The Network and Information Security (NIS) Directive, comes into effect October 2024, introducing more detailed incident reporting requirements and timelines.

• Identifying which sectors and companies will be expected to comply, such as cloud services and critical infrastructure

• Outlining the reporting requirements

The Cyber Resilience Act will affect companies selling into EU countries starting in 2027.

• Redesigning software to meet specification

• Reporting vulnerabilities in your software

Siobhan Gorman Partner, Cybersecurity, Data & Privacy Global Lead Brunswick Group

Chris Hale

Senior Director and Associate General Counsel for Cyber and National Security Cisco Systems

DORA, the Digital Operational Resilience Act, will affect financial institutions and their technology suppliers as of January 2025

• Reducing risk service providers and third-party vendors

• Meeting requirements for IT risk management and operational resiliency

10:00 AI Risk and Policy-and the Interplay with Cyber: Implementing AI Policy with a Risk Management Function

• Surveying how the different U.S. states are regulating Artificial Intelligence, what provisions are being included and how companies need to be thinking about incoming regulations

• Defining what is and what is not Artificial Intelligence—and how it can affect cybersecurity

• Examining what kind of Artificial Intelligence your company already has—and what it needs to develop or acquire

• Estimating your company’s AI risk tolerance and whether it is appropriate for your business

• Creating a policy and guidelines

• Setting up an AI oversight program

• Implementing AI safeguards

• Knowing how your third-party providers are using AI and how that may expose your company to cyber and other risk

• Examining the risk of becoming too dependent on an AI tool

10:45 Networking Break

11:00 THIRD PARTY MANAGEMENT

Alejandro Rosenberg

Attorney, Division of Privacy and Identity Protection

Federal Trade Commission

David Kessler

Vice President & Associate General Counsel, IT & Cybersecurity

BAE Systems, Inc.

Christine Ricci

General Counsel, Global Security & Digital Technology

GE Aerospace

Lynn M. van Buren Counsel

Spire Global

Vetting Third Party, Business Partner and Supply Chain Cyber Controls: Assessing Risks and Vulnerabilities

• Monitoring how your third-party providers are interacting with your data, what line of sight they have, and what is in your agreements

• Benchmarking: What are market standards for third-party contracts and what does a conservative contract include (and not include)

• Identifying which regulations will apply, how they overlap or differ, and to which vendor types

• Determining how far to go in your third-party due diligence and risk assessment— from the legal and IT sides

• Determining what is acceptable risk-and what is too much

• Onboarding new vendors and evaluating the risk

• Monitoring third party compliance

• Determining if and when to terminate a third-party relationship

Global Sponsorship Opportunities

With conferences in the United States, Canada, Latin America and Europe, the C5 Group of Companies: American Conference Institute, Canadian Institute, and C5 Group, provides a diverse portfolio of conferences, events and roundtables devoted to providing business intelligence to senior decision makers responding to challenges around the world.

Don’t miss the opportunity to maximize participation or showcase your organization’s services and talent. For more information please contact us at: SponsorInfo@AmericanConference.com

Jonathan Gannon

Chief Cyber and Privacy Counsel, Chief Privacy Officer

GE Vernova

Viet C. Tran

Senior Director & Associate General Counsel, Cybersecurity

RTX Corporation

11:45

Critical Infrastructure Security and Resilience Policy: The Industry Requirements and the Current Status of the CIRCIA Rule

The Cybersecurity and Infrastructure Security Agency (CISA) requires covered entities to report cyber incidents and ransomware payments under the Cyber Incident Reporting for Critical Infrastructure Act (2022) (CIRCIA)

This session will examine how cyber should be incorporated into critical infrastructure security and resilience policy. The current policy covers 16 critical infrastructure sectors, which are considered vital to US security, national economic security and national public health or safety.

• Adhering to CISA reporting timeframes

• Identifying which business categories are captured

Terry Kalka Director DC3 DCISE

Sam Singer Chief Counsel, Cyber Boeing

• Defining “critical infrastructure,” how it applies to different sectors and how it may be redefined under updated policy

• Examining CISA’s role to support state and industry partners

• Identifying essential workers needed to maintain services and functions for the public

• Hypothesizing potentially debilitating national security, economic, public health or safety consequences of a cyber breach and safeguarding against this possibility

• Clarifying reporting requirements following a breach 12:30 Networking Luncheon

1:30 Q&A State Legislative Panel on Cyber and Privacy Updates

Hear directly from state legislative representatives as they discuss how cybersecurity measures are being incorporated into state laws. Learn how state laws work in concert with federal laws and regulations, and where there are gaps. Join this interactive Q&A session.

Billee Elliott McAuliffe Member & Data Protection Practice Group Leader Lewis Rice LLC

2:00 Striking Down the Chevron Doctrine: How the Supreme Court and Lower Courts Will Now Be Approaching Legal Interpretation—and the Impact on Cyber Compliance

The U.S. Supreme Court issued a landmark decision in Loper Bright Enterprises v. Raimondo (2024) overturning Chevron USA v. National Resources Defense Council (1984) and the federal judiciary’s standing practice of accepting government agencies’ reasonable interpretations of ambiguous federal laws. This session will delve into what this precedentsetting decision will mean for government agencies regulating the cyber space.

• Unpacking the practical impact of the Supreme Court decision on cybersecurity compliance

• Calculating how much authority government agencies now have in the eyes of the courts

The C5 Group, comprising American Conference Institute, the Canadian Institute and C5 in Europe, is a leading global events and business intelligence company.

For over 40 years, C5 Group has provided the opportunities that bring together business leaders, professionals and international experts from around the world to learn, meet, network and make the contacts that create the opportunities. Our conferences and related products connect the power of people with the power of information, a powerful combination for business growth and success.

Myriah V. Jaworski Member Clark Hill PLC

2:45 Networking Break

3:00

CASE

STUDIES: Practical Takeaways from the Most Significant Security Incidents

Crowdstrike Software Update

Not a cyberattack, but the July 2024 software update caused widespread concerns and business disruption.

• Defining what is considered a cyber incident, what is material and what is filed in the 8K

• Delineating fault when there is a business disruption, recouping costs and indemnification

• How is this treated under the cybersecurity rule

Change Healthcare and Optimum Attack

Alyson Weckstein Tiegel

Assistant General Counsel, Cybersecurity Wells Fargo Bank

Sandeep Kathuria Senior Counsel

Ice Miller LLP

• The healthcare technology company Change Healthcare experienced a cyberattack, affecting millions of customers, in February 2024

SolarWinds and Lawsuit against CISO

• The Security and Exchange Commission has charged the SolarWinds CISO with fraud and internal control failures relating to a cybersecurity risk

• Exploring the extent of personal liability

• Testing how companies are presenting themselves as secure, and is the company doing what is advertised

ICBC Cyberattack

• Exploring business continuity in the midst of an attack and business resiliency

Microsoft-Related GDPR Violation

A Microsoft-owned advertising company, Xandr, is accused of a EU privacy breach under General Data Protection Regulation (GDPR) rules.

• Controlling subsidiaries and the reputational risk

• Examining the EU GDPR complaint process and possible fines

3:45 PLAINTIFF ATTORNEY PANEL

Perspectives from Plaintiff Attorneys and Takeaways from Recent Cases

• Trends in litigation and new, emerging types of cases

• Approaching a lawsuit from the plaintiff’s perspective

• Examining what steps companies can take to minimize litigation risk and liability

• Preparing and responding to litigation

• Clarifying where liability may be for an individual vs. the company

4:30 Closing Remarks by the Conference Co-Chairs Conference Concludes

Kenya Reddy Attorney Morgan & Morgan Complex Litigation Group

David K. Lietz Senior Partner

Milberg Coleman Bryson Phillips Grossman, LLC

Upcoming Events

VENUE INFORMATION

Hilton Arlington Towers

950 North Stafford Street Arlington, VA 22203 Phone: 1-800-445-8667

ACCOMMODATIONS

American Conference Institute is pleased to offer our delegates a limited number of hotel rooms at a negotiated rate. To take advantage of these rates, please contact the hotel directly and quote the group code “CYL.”

Please note that the guest room block cut-off date is December 27th, 2024. After that date OR when the room block fills, guestroom availability and rate can no longer be guaranteed.

BOOK NOW

Book with Confidence!

Register and pay to lock in your early rate and be eligible for a full refund until January 15th, 2025

If you are unable to attend for any reason, you will have the following options:

y A full credit note for you, or a colleague to attend another event.

y A full refund.

All cancellations and changes must be submitted to CustomerService@AmericanConference.com by January 15th, 2025

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.