Celesq® Attorneys Ed Center

Cyber Considerations in the Time of Covid-19

Program Number: 3097

Program Date: 03/27/2020

Description

Please join data security legal counsel and a leading forensic investigator for an empowering discussion of cyber considerations for companies in light of Covid-19. Attendees will hear about recent Covid-19 cyber threats and how to address them, how in-house counsel can prepare for a data breach in a remote work environment, and how incident response teams can address the myriad legal issues arising from a data breach.

$95.00Online Audio Add to Cart

Available in states

California, Colorado Eligible, Florida, Georgia, New Jersey Eligible, New York, Texas Self Study

Credit Information

50 minute credit hour - 1.0 General CLE credit, based on a 50 minute credit hour
60 minute credit hour - 1.0 General CLE credit, based on a 60 minute credit hour

State Program Numbers

Presenters


Scot Lippenholz

CrowdStrike

Scot Lippenholz has over 25 years of experience working in Information Technology, including 13 years of Information Security experience for the Federal Civil Government, Intelligence Community, Department of Defense, Fortune 500, and Defense Industrial Base organizations. For the past 12 years Scot has responded to and managed large-scale intrusion investigations and conducted forensic examinations for counterintelligence and counter-terrorism investigations. As a Manager at CrowdStrike Services, he has developed and performed many proactive security services and manages and performs analysis on many cyber incidents each year.

Prior to joining the CrowdStrike team, Scot performed incident response, malware hunting, and digital forensics for Mandiant\FireEye and Booz Allen Hamilton. While performing incident response, he worked with the FBI, US-CERT, and various OSI organizations. Previously, Scot was the Senior Manager for Security Operations for a Fortune 100 company providing him valuable insight into how information security can operate harmoniously with business processes.

Scot has presented on technical topics at multiple security conferences, including DoD Cybercrime, US Cybercrime, BSides, and US Cyberspace Symposium. Additionally, he has spoken on Advanced Cyber Threats and Malware to NASA, University of Texas at San Antonio, Alamo ISSA, and several other organizations

Scot attended Stevenson University in the Masters of Science Forensic Studies program and graduated with a Bachelors of Science in Information Studies from University of Maryland Baltimore County. His certifications include GIAC Certified Forensic Analyst (GCFA), CISSP, Access Data Certified Examiner (ACE), MCSE, MCDBA, CEH, ECSA, and DoD Certified Forensic Examiner.

 

Jena M. Valdetero, Esq

Greenberg Traurig

 

Jena M. Valdetero serves as Co-Chair of the firm’s U.S. Data, Privacy and Cybersecurity Practice where she advises clients on complex data privacy and security issues. She has led more than 1,000 data breach investigations. A litigator by background, Jena defends companies against privacy and data breach litigation, with an emphasis on class action lawsuits. She has designed and conducted dozens of data breach tabletop exercises to empower clients to respond effectively to a data security incident. She also counsels companies on data privacy and security compliance programs and advises on cyber risks associated with mergers and transactions. Jena also advises a diverse array of clients on compliance with existing and emerging privacy laws, including the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), the Gramm Leach Bliley Act (GLBA), and the Health Insurance Portability and Accountability Act (HIPAA). She is a certified privacy professional through the International Association of Privacy Professionals (CIPP/US), for which she is a former KnowledgeNet Co-Chair.

 

Jena is a passionate advocate of diversity and inclusion. She currently serves as a board member of the Chicago chapter of Women in Law Empowerment Forum.

CONCENTRATIONS

• Assessing cyber security risks and advising on data security incidents
• Drafting policies, procedures, and training materials related to data privacy and security compliance
• Conducting executive leadership data breach tabletops

 

 

Categories