2nd National Conference on
Cybersecurity LAW & COMPLIANCE
January 29–30, 2025 • Hilton Towers Arlington, VA
The only practical, comprehensive cybersecurity event for the legal and compliance community.
Key Enforcement Updates From:
Jorge G. Tenreiro
Deputy Chief, Crypto Assets and Cyber Unit, Division of Enforcement
U.S. Securities and Exchange Commission
2025 Co-Chairs:
Adam Cohen
Senior Director, Associate General Counsel for Cybersecurity Capital One
Joseph Whitehead
Senior Corporate Counsel, Cyber & Privacy
Northrop Grumman Corporation
Charu Chandrasekhar Partner
Debevoise & Plimpton LLP
Former Assistant Regional Director, SEC Division of Enforcement
Alejandro Rosenberg Attorney, Division of Privacy and Identity Protection Federal Trade Commission
Terry Kalka Director DC3 DCISE
Benefit from legal, compliance, risk management and incident response strategies, including:
The SEC DISCLOSURE RULE and MATERIALITY: Trends in Filings, Holding Statements and the Aftermath
CASE STUDIES Led by Prudential, Wells Fargo and Marriott: Lessons Learned from a Cyber Breach
EU CYBER COMPLIANCE: How to Satisfy DORA, NIS2 and More EU Requirements
CRITICAL INFRAUSTRUCTURE Security and Resilience: Industry Requirements and the Current Status of the CIRCIA Rule
BUSINESS CONTINUITY IN A CRISIS: Crafting the Message to the Board, Employees, Media and Beyond
AI RISK AND THE INTERPLAY WITH CYBER: Implementing AI Policy with a Risk Management Function
CYBER INSURANCE: The Lengths and Limits of Coverage, Cost and Privilege Supporting Sponsor
With so much at stake, ensure your organization’s cyber program is fully incorporating (and reconciling) a complicated web of federal, state and international requirements.
Assess whether or not your organization is equipped to satisfy SEC, FTC and more agencies’ expectations.
Join ACI’s 2nd National Conference on Cybersecurity Law & Compliance Conference – the country’s only practical, comprehensive event for the legal and compliance community.
Learn from participating organizations, including:
• Agricultural Bank of China, New York Branch
• BAE Systems
• Boeing
• Cisco Systems
EARN
CLE CREDITS
• Citigroup
• Hudson Insurance Group
• IBM
• Marriott International
Benefits of attending:
• Prudential Financial
• RTX Corporation
• Spire Global
• Wells Fargo Bank
HEAR directly from government representatives about policy, compliance and enforcement actions
GAIN the latest practical and actionable strategies for incident response
LEARN how to vet third party business partners and secure your supply chain
NETWORK with cross-sector corporate executives and benchmark with your peers
Accreditation will be sought in those jurisdictions requested by the registrants which have continuing education requirements. This course is identified as nontransitional for the purposes of CLE accreditation.
ACI certifies this activity has been approved for CLE credit by the New York State Continuing Legal Education Board.
ACI certifies this activity has been approved for CLE credit by the State Bar of California.
ACI has a dedicated team which processes requests for state approval. Please note that event accreditation varies by state and ACI will make every effort to process your request.
For more information on ACI’s CLE process, visit: www.AmericanConference.com/Accreditation/CLE
Faculty
CONFERENCE CO-CHAIRS
Adam Cohen
Senior Director, Associate General Counsel for Cybersecurity Capital One
Joseph Whitehead
Senior Corporate Counsel, Cyber & Privacy Northrop Grumman Corporation
Charu Chandrasekhar Partner
Debevoise & Plimpton LLP
Former Assistant Regional Director, Division of Enforcement and Chief U.S. Securities and Exchange Commission
GOVERNMENT SPEAKERS
Eun Young Choi
Deputy Assistant Attorney General, National Security Division U.S. Department of Justice
Alejandro Rosenberg Attorney, Division of Privacy and Identity Protection Federal Trade Commission
Terry Kalka Director DC3 DCISE
Jorge G. Tenreiro
Deputy Chief, Crypto Assets and Cyber Unit, Division of Enforcement U.S. Securities and Exchange Commission
INDUSTRY REPRESENTATIVES
Billee Elliott McAuliffe
Member & Data Protection Practice Group Leader Lewis Rice LLC
Joanna Baltes
Chief Cybersecurity Counsel, Americas IBM
Guillermo S. Christensen Partner K&L Gates LLP
Michael Court
Deputy General Counsel Agricultural Bank of China, New York Branch
Monique Ferraro Cyber Counsel HSB
Jonathan Gannon
Chief Cyber and Privacy Counsel, Chief Privacy Officer GE Vernova
Chris Hale
Senior Director and Associate General Counsel for Cyber and National Security Cisco Systems
Jocelyn J. Hunter
Vice President & Deputy General Counsel The Home Depot
Britt Ide Board Director NorthWestern Energy, PowerGEM LLC, Technosylva
Ali Karshan
Managing Director, General Counsel for Cybersecurity Citigroup Inc.
David Kessler
Vice President & Associate General Counsel, IT & Cybersecurity BAE Systems, Inc.
Sonita Lontoh
Independent Board Director, Member of Audit and Compensation Committees Sunrun TrueBlue Inc.
Emily Lowe
Senior Vice President, Cyber Practice Leader Hudson Insurance Group
Christine Ricci
General Counsel, Global Security & Digital Technology GE Aerospace
Amy Waller Apostol
Assistant General Counsel, Cyber & Emerging Technologies Legal Department Leidos
Alyson Weckstein Tiegel
Assistant General Counsel, Cybersecurity Wells Fargo Bank
Kimberly J. Shur
Senior Vice President, Global Compliance Counsel & Privacy Officer Marriott International Inc.
PRIVATE PRACTICE FACULTY
Marc Rothenberg
Chief Legal Officer, Cybersecurity, Data Privacy, and AI Law Prudential Financial
Mike Serra
Senior Counsel for Cyber and National Security Cisco Systems, Inc.
Sam Singer
Chief Counsel, Cyber Boeing
Viet C. Tran
Senior Director & Associate General Counsel, Cybersecurity RTX Corporation
Lynn M. van Buren
Counsel Spire Global
John P. Carlin
Cybersecurity & Data Protection Practice Group Co-chair and Partner Paul, Weiss
Nathan D. Fisher
Managing Director StoneTurn
Siobhan Gorman
Partner, Cybersecurity, Data & Privacy Global Lead Brunswick Group
Katherine Doty Hanniford Partner, Privacy, Cyber & Data Strategy Practice Alston & Bird LLP
Myriah V. Jaworski Member Clark Hill PLC
Sandeep Kathuria Senior Counsel Ice Miller LLP
Brian Levine
Managing Director, Cybersecurity & Data Privacy EY-Parthenon
David K. Lietz
Senior Partner
Milberg Coleman Bryson Phillips Grossman, LLC
Amy Mushahwar Partner
Lowenstein Sandler LLP
Kimberly Peretti Partner, Co-leader of the Privacy, Cyber & Data Strategy Team Alston & Bird LLP
Kenya Reddy
Attorney
Morgan & Morgan Complex Litigation Group
Pre-Conference Workshops
Tuesday, January 28, 2025
WORKSHOP A 9:00 am–12:30 pm (Registration opens at 8:30 am)
A Roadmap to Building a Cyber Program: Dissecting the Patchwork of Federal, State and Industry Requirements, Including NIST and SEC
Join this interactive session to gain a complete roadmap to the patchwork of federal, state and industry regulations. Under the SEC’s newly adopted cybersecurity risk management rules, public companies are now required to disclose a cyber breach publicly and within four days. This session will unpack the requirements, grey areas, practical implications and key missteps to avoid:
Part One: Federal Regulations
• Setting the highest standard to satisfy government regulations and protect your organization
• Implementing regulations and operationalizing them through policies and procedures
• Clarifying key requirements, including deadlines
Michael Court Deputy
General Counsel
Agricultural Bank of China, New York Branch
Amy Mushahwar Partner
Lowenstein Sandler LLP
• Satisfying SEC’s expectations for incident reporting within four days, and specifically the expectation for a Form 8-K and Form 10-K filing
• Updating initial reports, and what is expected in follow-up reports
• Defining a “material” cybersecurity incident as reaching a threshold reasonable investors consider important to their decision-making
• Assessing the incident's effects, remediation efforts, cyber insurance impacts, and estimated costs of a breach
Part Two: Complying with State, Federal and Industry Specific Requirements
• Identifying what is being regulated, where there are similarities, differences and gaps between the regulations
• Meeting reporting obligations and communicating to the different state regulators
• Determining the impact of regulations on your business operations
Join this interactive segment with hypothetical scenarios to work through expected and lesser-known scenarios, actions and outcomes.
Delve into the essential best practices and strategies for rolling out an effective action plan, and tackling hurdles to incident response:
• Determining the response to an IT issue that doesn’t get raised to the board or senior management
» Identifying what a routine response looks like
» Analyzing the hallmarks of an incident to measure severity and if it amounts to a crisis
• Responding to a progressively more severe situation and ransomware demand
» Recent examples of how (and how not) to respond to a ransomware demand
» Examining what the company policy says, and how it may apply to different situations
» Determining whether or not to pay or not pay ransomware
• Communicating your company’s position when the event goes public
» Analyzing how a cyber incident changes when it becomes public
» How to respond when the company is a consumer facing business
» Responding to media attention and scrutiny
• Implementing a resiliency and redundancy plan
» Implementing the full plan for crisis recovery
» Defining what business continuity looks like-and what needs to change moving forward
Guillermo S. Christensen Partner
K&L Gates LLP
Nathan D. Fisher Managing Director
StoneTurn
Main Conference Day One
Wednesday, January 29, 2025
7:45 Registration & Breakfast
8:45 Opening Remarks from the Co-Chairs
Adam Cohen
Senior Director, Associate General Counsel for Cybersecurity Capital One
Joseph Whitehead
Senior Corporate Counsel, Cyber & Privacy
Northrop Grumman Corporation
Charu Chandrasekhar Partner
Debevoise & Plimpton LLP
Former Assistant Regional Director, Division of Enforcement and Chief
U.S. Securities and Exchange Commission
9:00 FIRESIDE CHAT: What May Be Eligible for a National Security Exception to the 4-Day SEC Deadline
This session will discuss the circumstances under which the U.S. government will grant an exception for a cybersecurity disclosure filing beyond the four-day deadline. AT&T made a delayed disclosure filing, due to “national security and public safety concerns,” in July 2024.
Eun Young Choi
Deputy Assistant Attorney General, National Security Division
U.S. Department of Justice
• Examining when and how the exception applies
• Factors affecting the decision to grant an exception
• How is AI being viewed as a risk and as a compliance tool-and the interplay with national security
9:30 SEC Disclosure Rule and Materiality One-Year In: Trends in the Number and Types of Filings, Holding Statements and the Aftermath
Join this session for a one-year review and status report on how the SEC disclosure rule is working in practice, the compliance expectations and challenges, and the lessons from the past year.
• Overview of what the SEC is seeing in terms of the number of filings, and trends in the numbers
Jorge G. Tenreiro
Deputy Chief, Crypto Assets and Cyber Unit, Division of Enforcement
U.S. Securities and Exchange Commission
• Examining whether companies are satisfying compliance expectations and when companies could be showing more fulsome reporting
• How many “holding statements” are being submitted to say that an incident has occurred, without saying whether it is “material” and how companies have determined materiality
• How different industries have interpreted and applied the rule
• The required level of detail in reporting
10:15 Networking Break
10:30 Keynote Address
The New York State Department of Financial Services announced updated cybersecurity regulations to enhance cyber governance, mitigate risks, and protect New York businesses and consumers from cyber threats – touted as a “first in the nation”. The strategy is in addition to the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act)
During this highly anticipated session, benefit from key updates and takeaways that will can help to strengthen your cyber compliance strategy.
11:00 Case Study: Lessons Learned from a Cyber Breach
Hear directly from organizations that have experienced a cyber breach and delve into the critical — and unexpected — steps that were taken to identify, communicate and mitigate the damage.
• Working with the FBI and other authorities
• Examining the hack tactics, trends and how vulnerabilities are being exploited
• Reviewing timelines of a breach, and lessons learned for prevention and incident response
Jocelyn J. Hunter Vice President & Deputy General Counsel The Home Depot
Kimberly J. Shur
Senior Vice President, Global Compliance Counsel & Privacy Officer
Marriott International Inc.
Marc Rothenberg
Chief Legal Officer, Cybersecurity, Data Privacy, and AI Law Prudential Financial
12:00 Networking Luncheon
1:15 Cyber and Corporate Governance: Perspectives from Board Members on Priorities and Expectations
Join this session to learn more about board member cyber security priorities, how best to communicate cyber concerns to board members, and how companies need to interact with the board in accordance with the SEC disclosure rules.
Britt Ide Board Director NorthWestern Energy, PowerGEM LLC, Technosylva
Brian Levine Managing Director, Cybersecurity & Data Privacy EY-Parthenon
Sonita Lontoh Independent Board Director, Member of Audit and Compensation Committees Sunrun TrueBlue Inc.
Moderated by:
John P. Carlin
Cybersecurity & Data Protection Practice Group Co-chair and Partner Paul, Weiss
2:00 BUSINESS CONTINUITY
The
Unspoken Rules for Maintaining Business
Continuity in the Event of a Cyberattack or Disruption
• Assessing how a cyber incident will impact business from a macro lens
• Strategizing how the company will react to a cyber attack and ensuring policies are in place
• Implementing non-tech reliant redundancy systems, and showing you can switch providers
• Anticipating the impact on supply chains, vendors, partners and clients
• Assessing the damage: Determining if you can continue to provide service, pay employees and perform other critical business functions
• Implementing the necessary safeguards to protect from further damage and mitigate the risk of a future incident
• Updating your disaster analysis and recovery plan
• Strengthening your security safeguards and protocols
Joanna Baltes Chief Cybersecurity Counsel, Americas IBM
Adam Cohen Senior Director, Associate General Counsel for Cybersecurity Capital One
Monique Ferraro Cyber Counsel HSB
Amy Waller Apostol Assistant General Counsel, Cyber & Emerging Technologies Legal Department Leidos
3:15 Communicating in a Crisis: Executing a Comprehensive Communication Plan and Controlling the Message to the Board, Employees, Media and Beyond
• Controlling the message internally and externally to the government, to the public, to the board, employees, customers and clients
» Responding to the government reporting agencies in a timely and accurate fashion
» Proactively addressing what a hacker is saying about your company to the media
» Getting the correct team of experts in front of the board to address questions
» Supporting employees who are being exploited by hackers
• Documenting events for reporting purposes
• Coordinating with law enforcement for the response and mediation
• Avoiding negative consequences of not communicating
• Exploring how company culture impacts crisis communication
Ali Karshan
Managing Director, General Counsel for Cybersecurity Citigroup Inc.
Christine Ricci
General Counsel, Global Security & Digital Technology GE Aerospace
Kimberly Peretti
Partner, Co-leader of the Privacy, Cyber & Data Strategy Team Alston & Bird LLP
4:00 Cyber
Insurance: The Lengths and Limits of Coverage from Cost, Scope and Privilege
• Delineating what insurance will and will not cover, including ransomware, property damage and political violence insurance
• Considering options when ransomware is excluded from insurance
• Identifying your company’s weak points and exposure, what insurance type is needed, and covering your assets
• Calculating the cost of company exposure versus the affordability of insurance
• Demystifying key provisions and exemptions in policies—and what they mean in practice
• When to involve insurance brokers in privileged legal counsel discussions
4:45 Closing Remarks from the Conference Co-Chairs
Networking Cocktail Reception
Monique Ferraro Cyber Counsel HSB
Emily Lowe
Senior Vice President, Cyber Practice Leader Hudson Insurance Group
Main Conference Day Two
Thursday, January 30, 2024
8:30 Registration Opens
8:45 Opening Remarks from the Conference Co-Chairs
Adam Cohen
Senior Director, Associate General Counsel for Cybersecurity Capital One
Joseph Whitehead
Senior Corporate Counsel, Cyber & Privacy
Northrop Grumman Corporation
Charu Chandrasekhar Partner
Debevoise & Plimpton LLP
Former Assistant Regional Director, Division of Enforcement and Chief U.S. Securities and Exchange Commission
8:50 Special Update: Evolving Threat Actor Landscape, National Security Risks
• Examining the threat actor landscape, where the threats are coming from, how are they manifesting, and the impact on companies and business
• Gauging the level and intensity of cyber attacks
• Lessons learned from recent cyber incidents including:
» Interactions with the hacking groups Scattered Spider and LockBit
• What are government agencies doing to combat cyber attackers, and has it been effective?
Moderated by:
and Ransomware
Katherine Doty Hanniford Partner, Privacy, Cyber & Data Strategy Practice Alston & Bird LLP
» Paying or not to paying ransomware: Key considerations, including when economic sanctions come into play
» Negotiating with hackers: Best practices
9:15
EU
CYBER COMPLIANCE
How to Satisfy DORA, NIS2 and More EU Requirements: Overcoming Hurdles to Implementation the U.S.
The EU is leading the charge in cybersecurity and US companies need to be bracing for impact. This session will address current and incoming European legislation and regulations that will affect global businesses.
NIS2, The Network and Information Security (NIS) Directive, comes into effect October 2024, introducing more detailed incident reporting requirements and timelines.
• Identifying which sectors and companies will be expected to comply, such as cloud services and critical infrastructure
• Outlining the reporting requirements
The Cyber Resilience Act will affect companies selling into EU countries starting in 2027.
• Redesigning software to meet specification
• Reporting vulnerabilities in your software
Siobhan Gorman Partner, Cybersecurity, Data & Privacy Global Lead Brunswick Group
Chris Hale
Senior Director and Associate General Counsel for Cyber and National Security Cisco Systems
DORA, the Digital Operational Resilience Act, will affect financial institutions and their technology suppliers as of January 2025
• Reducing risk service providers and third-party vendors
• Meeting requirements for IT risk management and operational resiliency
10:00 AI Risk and Policy-and the Interplay with Cyber: Implementing AI Policy with a Risk Management Function
• Surveying how the different U.S. states are regulating Artificial Intelligence, what provisions are being included and how companies need to be thinking about incoming regulations
• Defining what is and what is not Artificial Intelligence—and how it can affect cybersecurity
• Examining what kind of Artificial Intelligence your company already has—and what it needs to develop or acquire
• Estimating your company’s AI risk tolerance and whether it is appropriate for your business
• Creating a policy and guidelines
• Setting up an AI oversight program
• Implementing AI safeguards
• Knowing how your third-party providers are using AI and how that may expose your company to cyber and other risk
• Examining the risk of becoming too dependent on an AI tool
10:45 Networking Break
11:00 THIRD PARTY MANAGEMENT
Alejandro Rosenberg
Attorney, Division of Privacy and Identity Protection
Federal Trade Commission
David Kessler
Vice President & Associate General Counsel, IT & Cybersecurity
BAE Systems, Inc.
Christine Ricci
General Counsel, Global Security & Digital Technology
GE Aerospace
Lynn M. van Buren Counsel
Spire Global
Vetting Third Party, Business Partner and Supply Chain Cyber Controls: Assessing Risks and Vulnerabilities
• Monitoring how your third-party providers are interacting with your data, what line of sight they have, and what is in your agreements
• Benchmarking: What are market standards for third-party contracts and what does a conservative contract include (and not include)
• Identifying which regulations will apply, how they overlap or differ, and to which vendor types
• Determining how far to go in your third-party due diligence and risk assessment— from the legal and IT sides
• Determining what is acceptable risk-and what is too much
• Onboarding new vendors and evaluating the risk
• Monitoring third party compliance
• Determining if and when to terminate a third-party relationship
Global Sponsorship Opportunities
With conferences in the United States, Canada, Latin America and Europe, the C5 Group of Companies: American Conference Institute, Canadian Institute, and C5 Group, provides a diverse portfolio of conferences, events and roundtables devoted to providing business intelligence to senior decision makers responding to challenges around the world.
Don’t miss the opportunity to maximize participation or showcase your organization’s services and talent. For more information please contact us at: SponsorInfo@AmericanConference.com
Jonathan Gannon
Chief Cyber and Privacy Counsel, Chief Privacy Officer
GE Vernova
Viet C. Tran
Senior Director & Associate General Counsel, Cybersecurity
RTX Corporation
11:45
Critical Infrastructure Security and Resilience Policy: The Industry Requirements and the Current Status of the CIRCIA Rule
The Cybersecurity and Infrastructure Security Agency (CISA) requires covered entities to report cyber incidents and ransomware payments under the Cyber Incident Reporting for Critical Infrastructure Act (2022) (CIRCIA)
This session will examine how cyber should be incorporated into critical infrastructure security and resilience policy. The current policy covers 16 critical infrastructure sectors, which are considered vital to US security, national economic security and national public health or safety.
• Adhering to CISA reporting timeframes
• Identifying which business categories are captured
Terry Kalka Director DC3 DCISE
Sam Singer Chief Counsel, Cyber Boeing
• Defining “critical infrastructure,” how it applies to different sectors and how it may be redefined under updated policy
• Examining CISA’s role to support state and industry partners
• Identifying essential workers needed to maintain services and functions for the public
• Hypothesizing potentially debilitating national security, economic, public health or safety consequences of a cyber breach and safeguarding against this possibility
• Clarifying reporting requirements following a breach 12:30 Networking Luncheon
1:30 Q&A State Legislative Panel on Cyber and Privacy Updates
Hear directly from state legislative representatives as they discuss how cybersecurity measures are being incorporated into state laws. Learn how state laws work in concert with federal laws and regulations, and where there are gaps. Join this interactive Q&A session.
Billee Elliott McAuliffe Member & Data Protection Practice Group Leader Lewis Rice LLC
2:00 Striking Down the Chevron Doctrine: How the Supreme Court and Lower Courts Will Now Be Approaching Legal Interpretation—and the Impact on Cyber Compliance
The U.S. Supreme Court issued a landmark decision in Loper Bright Enterprises v. Raimondo (2024) overturning Chevron USA v. National Resources Defense Council (1984) and the federal judiciary’s standing practice of accepting government agencies’ reasonable interpretations of ambiguous federal laws. This session will delve into what this precedentsetting decision will mean for government agencies regulating the cyber space.
• Unpacking the practical impact of the Supreme Court decision on cybersecurity compliance
• Calculating how much authority government agencies now have in the eyes of the courts
The C5 Group, comprising American Conference Institute, the Canadian Institute and C5 in Europe, is a leading global events and business intelligence company.
For over 40 years, C5 Group has provided the opportunities that bring together business leaders, professionals and international experts from around the world to learn, meet, network and make the contacts that create the opportunities. Our conferences and related products connect the power of people with the power of information, a powerful combination for business growth and success.
2:45 Networking Break
3:00
CASE
STUDIES: Practical Takeaways from the Most Significant Security Incidents
Crowdstrike Software Update
Not a cyberattack, but the July 2024 software update caused widespread concerns and business disruption.
• Defining what is considered a cyber incident, what is material and what is filed in the 8K
• Delineating fault when there is a business disruption, recouping costs and indemnification
• How is this treated under the cybersecurity rule
Change Healthcare and Optimum Attack
Alyson Weckstein Tiegel
Assistant General Counsel, Cybersecurity Wells Fargo Bank
Sandeep Kathuria Senior Counsel
Ice Miller LLP
• The healthcare technology company Change Healthcare experienced a cyberattack, affecting millions of customers, in February 2024
SolarWinds and Lawsuit against CISO
• The Security and Exchange Commission has charged the SolarWinds CISO with fraud and internal control failures relating to a cybersecurity risk
• Exploring the extent of personal liability
• Testing how companies are presenting themselves as secure, and is the company doing what is advertised
ICBC Cyberattack
• Exploring business continuity in the midst of an attack and business resiliency
Microsoft-Related GDPR Violation
A Microsoft-owned advertising company, Xandr, is accused of a EU privacy breach under General Data Protection Regulation (GDPR) rules.
• Controlling subsidiaries and the reputational risk
• Examining the EU GDPR complaint process and possible fines
3:45 PLAINTIFF ATTORNEY PANEL
Perspectives from Plaintiff Attorneys and Takeaways from Recent Cases
• Trends in litigation and new, emerging types of cases
• Approaching a lawsuit from the plaintiff’s perspective
• Examining what steps companies can take to minimize litigation risk and liability
• Preparing and responding to litigation
• Clarifying where liability may be for an individual vs. the company
4:30 Closing Remarks by the Conference Co-Chairs Conference Concludes
Kenya Reddy Attorney Morgan & Morgan Complex Litigation Group
David K. Lietz Senior Partner
Milberg Coleman Bryson Phillips Grossman, LLC
Upcoming Events
VENUE INFORMATION
Hilton Arlington Towers
950 North Stafford Street Arlington, VA 22203 Phone: 1-800-445-8667
ACCOMMODATIONS
American Conference Institute is pleased to offer our delegates a limited number of hotel rooms at a negotiated rate. To take advantage of these rates, please contact the hotel directly and quote the group code “CYL.”
Please note that the guest room block cut-off date is December 27th, 2024. After that date OR when the room block fills, guestroom availability and rate can no longer be guaranteed.
BOOK NOW
Book with Confidence!
Register and pay to lock in your early rate and be eligible for a full refund until January 15th, 2025
If you are unable to attend for any reason, you will have the following options:
y A full credit note for you, or a colleague to attend another event.
y A full refund.
All cancellations and changes must be submitted to CustomerService@AmericanConference.com by January 15th, 2025