Privacy and Data Security – What Are Your Potential Liabilities?
Earlier this year we learned from security experts about new threats, types of vulnerabilities and malware, sources of attacks, and other important security information to help educate and arm you with material to keep your business’ and customer’s information safe.
Now, we’re taking a look at the legal side of security breaches. You’ve taken all the precautionary measures to prevent your business from being another victim of attack, but what if something still happens? What if your vendor has a security breach? How can you protect yourself in the court room?
In this program you'll find answers to these questions and learn about:
- Your potential liabilities
- Types of issues that arise when you outsource or license
- How to create a privacy and data security strategy
- How to respond to and mitigate an unauthorized disclosure
|Richard D. Spilde, Jr., Partner, Holland & Hart|
Mr. Spilde's practice focuses on representing clients in high technology businesses, including the telecommunications, cable television, software and information technology industries. His practice includes assisting clients with a wide variety of technology transactions, including software licensing, maintenance and support agreements, content licensing and distribution agreements, consulting and development agreements, electronic commerce agreements, managed services agreements, software escrow agreements, web development and hosting agreements, complex procurement agreements, and intellectual property licensing transactions.
|Elizabeth E. Harding, Of Counsel, Holland & Hart|
Ms. Harding's practice focuses on sophisticated technology transactions, data privacy, and intellectual property law. She drafts and negotiates complex technology transfer agreements and provides clients with comprehensive advice regarding privacy and information security (with an emphasis on UK and wider European legislation and regulation). Ms. Harding also has extensive experience in the issues arising out of electronic health care records, healthcare informatics and the licensing of personally identifiable information in the healthcare field.
|Mark B Wiletsky, Of Counsel, Holland & Hart|
Mr. Wiletsky has experience representing public and private entities in virtually all aspects of employment law. He advises employers and executives on issues such as employee handbooks, executive contracts and severance agreements, covenants not to compete or solicit, and trade secret protection and misappropriation. Mr. Wiletsky has also counseled employers regarding layoffs and workplace investigations, as well as how to protect sensitive data and what to do in the event of a data security breach.
|William Taylor, Co-Founder, Managing Director, and General Counsel, Cyopsis |
William leads cybercrime and forensic IT investigations, oversees electronic discovery efforts, acts as the forensic IT team lead for critical incident response in the wake of data breaches, and serves as legal counsel for Cyopsis. He brings to these tasks more than 20 years of combined law practice and investigative experience, in service to individuals, businesses, and organizations large and small, from federal government agencies to Fortune 500 companies. In nine years of private practice at national and regional law firms in Washington, D.C. and Denver, Colorado and in sole practice, Mr. Taylor has specialized in representations of individuals and corporations in federal grand jury investigations, parallel civil and criminal proceedings, and criminal trials, complex commercial litigation, government contracts litigation, and data security and privacy matters. Mr. Taylor served for eleven years as a state and federal prosecutor, including four years as Chief of the Major Crimes Section at the United States Attorney’s Office for the District of Colorado.
|Don Beck, Senior Vice President, Worldwide Field Operations, Webroot|
Leading worldwide field operations for Webroot, Don Beck is responsible for driving revenue growth and market leadership for the business through global sales, field marketing and channel strategies. Beck joined Webroot in 2009 as general manager and senior vice president of Enterprise SaaS, bringing over 29 years of enterprise sales and management expertise including 18 years with IBM. After IBM, he held senior sales management positions at J.D. Edwards, Brio and Adobe before joining Postini in 2006. At Postini, Beck directed Postini's worldwide sales expansion to make it one of the largest SaaS-based security vendors in the industry before its sale to Google. Most recently, he directed the sales effort at Ncomputing before joining Webroot. Beck holds a master’s degree in finance from Miami University and a bachelor’s degree in sales and marketing from Michigan State University. He has served as a board member of numerous business and educational institutions. Beck was recognized by the Denver Business Journal as one of the Colorado’s most influential business leaders in 1995, 1996 and 1997.
Complimentary for all CSIA Members
7:30am - 8:00am Breakfast & Registration
8:00am - 9:30am Panel Discussion and Q&A
9:30am - 10:00am Networking