Join us for an evening of networking, dinner, and drinks while you learn about data breaches from technical and legal perspectives, sponsored by Joinesty - Instantly Make Your Data Useless to Cybercriminals.
*Please bring government issued photo id*
5:30-6:20pm: Networking, Dinner, Drinks
6:20-6:30pm: Introduction from host and sponsors
6:30-7:10pm: Data Integrity Breaches
Abstract: The most publicized security events of the past year have centered on theft or unauthorized access of data, with data being held for ransom or sold to the highest bidder on the black market. However, behind the scenes in both the public and private sector, experts and decision-makers are more afraid of integrity breaches than outright theft. Whether it’s voter systems or banking, a quiet attack that compromises a single unknown record can jeopardize an entire system’s integrity. Companies must continue to focus on building strong defenses against theft but must also explore other security solutions that can minimize or even neutralize the potential harm of the threats associated with data integrity.
Bio: Elder Santos is the CTO of Joinesty, a stealth cybersecurity company focusing on data cloaking. Holding an MSc in Artificial Intelligence, Mr. Santos is an accomplished software engineer and researcher specialized in machine learning and focused on cybersecurity. With more than 15 years of experience, he has patents, papers, and articles published as well as still being an active practitioner. He was the software engineer and technical lead for the maintenance software for the light attack aircraft Embraer Super Tucano, and was responsible for the architecture and management of the maintenance software for the ground attack aircraft Embraer A1M modernization program. Before that, he was a manager in the Microsoft Innovation Center in Sao Paulo, Brazil. Mr. Santos holds several IT certifications including: MCSD, MCSA, MCDBA, MCAD, MCTS and MCT.
7:20-8pm: Legal Overview of Data Breaches in the U.S.
Greg J. Leighton and Bari L. Nathan
Abstract: Data breaches are one of the most significant threats that an organization faces, and each circumstance in which a company’s data has been exposed will have a different set of technical and legal considerations that the company will have to consider in order to best minimize their exposure. All 50 states have enacted state breach notification laws, which requires consumers to be notified when their personally identifiable information has been exposed or when the company’s data security measures have been breached. Determining which laws are applicable, the company’s obligations under the laws, and necessary incident management steps are all crucial things a company must consider when experiencing a data breach.
Bio: Greg Leighton is the leader of NGE’s data privacy and information governance practice. Greg is a Certified Information Privacy Professional (CIPP/US and CIPP/E) and a Certified Information Privacy Manager (CIPM) by the International Association of Privacy Professionals. He counsels clients on how to build efficient and effective information governance programs. He offers sage advice regarding the development of information governance policies, information security policies, data maps, privacy policies, and data breach response plans. Bari L. Nathan is an associate in Neal Gerber & Eisenberg’s Intellectual Property Group where she focuses her practice on data privacy and compliance matters, in addition to trademark and copyright matters including clearance, registration, prosecution, portfolio management, enforcement, and litigation. She is also a Certified Information Privacy Professional (CIPP/US).
CPE Credits are available for this event