Attention:
Card image cap

Beyond Encryption: Protecting Your Company's Assets & Client Confidence


Level: Advanced
Runtime: 56 minutes
Recorded Date: June 12, 2017
Click here to share this program
Download PDF

Agenda

  • Current data security and privacy environment
  • Indiscriminate data retention
  • Ephemerality and Risk Management
Runtime: 56 minutes
Recorded: June 12, 2017

Description

From massive breaches to fear of litigation and rising costs of e-discovery, the urge to retain large amounts of information has been tempered by evidence that holding data when not required can actively work against companies’ interests. While data encryption is a great step forward, a mere fact of storing too much sensitive client data significantly increases security risks and potential liability. How can law firms minimize the window of opportunity for attackers while enabling active communication in house and with the clients?

This session will discuss how proactive ephemerality, or automatic data deletion, can help manage information security risks, support in-house and client collaboration while ensuring that no valuable communication lives beyond its useful life and intended recipients.

This program was recorded on June 12th, 2017.

Provided By

Legalweek
Card image cap

Panelists

Card image cap

Jessy Irwin

Vice President & Security+ Privacy Consultant
Jessysaurusrex, LLC

Jessy Irwin is a security communications education expert who excels in translating complex cybersecurity issues into simple, relatable terms for non-technical audiences. In her work as an consultant, security executive, and former Security Empress at 1Password, she has taught people how to better protect themselves, their data and their identities online. Her current areas of interest include making security more accessible for the average person, advocating for strong privacy protections in education for students, building better models for digital security training, and building proactive security communications strategies for consumers, policymakers, small businesses and Fortune500 companies. Irwin regularly writes and presents internationally on human-centric security, student privacy, and security communication at events including O’Reilly Security, RSA Conference, TechSummit Amsterdam, Infosec Southwest, and Shmoocon. Her work has appeared in CSO Online, VICE Broadly, Mashable, TechCrunch, and CNN.

Card image cap

Wynter Lavier Deagle

Member
Mintz, Levin, Cohn, Ferris, Glovsky & Popeo, P.C.

Wynter is a seasoned trial lawyer whose practice encompasses a wide range of litigation matters including business disputes, commercial litigation, corporate governance, fiduciary duties, class actions and First Amendment claims. Wynter has helped numerous companies, particularly in the technology, life sciences, financial and professional services sectors, craft business solutions to a variety of complex legal problems including business fraud, misappropriation of trade secrets, breaches of fiduciary duty, and contract disputes. Wynter has an aggressive but practical approach to business disputes and her clients rely on her to create and implement a successful strategy when initiating, defending, or avoiding litigation.

Wynter counsels directors and officers of both public and private companies on corporate governance issues and fiduciary duties. Wynter’s client representation reflects the breadth of her practice. Her clients include directors and officers of manufacturing companies, medical device companies, pharmaceutical and life sciences companies, regulated broker-dealers, investment banking and asset management firms, non-profit and for-profit hospitals, and private foundations.

A member of the International Association of Privacy Professionals, Wynter also counsels clients in proactively identifying, assessing, and managing risks associated with their privacy, data security, and information management practices. In addition to cybersecurity counseling, Wynter’s practice focuses on assisting clients in the areas of data breach compliance, incident management and response, and privacy related litigation. Wynter has also assisted clients in responding to regulatory inquiries regarding their data security practices.

Wynter has extensive experience representing corporate and individual clients in cases involving allegations of false claims, mail fraud, false statements, public corruption, and campaign finance violations. Wynter has represented clients at all stages of government investigations. Wynter has also conducted internal investigations, both at the client’s own initiative and following receipt of a subpoena or other notice of a government investigation, in the areas of embezzlement, fraud, Foreign Corrupt Practices Act (FCPA) violations, consumer protection claims, and California’s unfair competition law, among others.

Card image cap

Jennifer DeTrani

General Counsel
Wickr

As General Counsel, Jennifer manages Wickr’s legal and human resources departments and manages privacy concerns affecting the company.

Card image cap

John Villasenor

Professor
UCLA School of Law

John Villasenor, a visiting professor at the UCLA School of Law, a nonresident senior fellow at the Brookings Institution, and a National Fellow at the Hoover Institution, Stanford. He is also a visiting professor of law, at the University of California, Los Angeles, a member of the World Economic Forum’s Global Agenda Council on Cybersecurity, and a member of the Council on Foreign Relations. His work addresses the intersection of technology, policy and law.


Card image cap

Similar Courses

Card image cap
64 minutes
"I Am Not a Cat" Proceedings in a Virtual World
Besides becoming a pop-culture catchphrase, how has the shift to a virtual environment impacted proceedings over the last year, and what changes do you believe are here to stay? Our panel of experts will examine some of the greatest challenges, faux pas, and successes in virtual proceedings over the course of this transformative time.

Women, Influence & Power in Law Conference

$65

Add to Cart
Card image cap
63 minutes
2021: The Year of the ELM
Panelists will clarify what constitutes an ELM platform, examine its unique and compelling capabilities, and discuss its strategic and tactical advantages, particularly those stemming from data-driven insights and machine-driven decision making. Attendees will gain a clear understanding of the significance of the emergence of ELM solutions, what firms and law departments can achieve with ELM platform, and practical and ethical considerations related to adopting an ELM solution.

Legalweek

$65

Add to Cart
Card image cap
97 minutes
26 Words that Created the Internet - Basics of the Communications Decency Act Section 230 Safe Harbor
This program will examine the basics of CDA 230 and its day to day affect for those who advise internet businesses as well as those who litigate against them. It will give practical guidance as to what extend internet companies can or should edit or censor the information their users contribute to their sites and to what extent those users will actually be liable.

New Media Rights

$115

Add to Cart
Card image cap
63 minutes
360-Degree View on How to Navigate a Crisis
During this session, our panel of experts will explore the following topics to arm you with a plan to protect the company and minimize long-term problems: - Building a crisis management team and understanding each person’s unique role -Preparedness – advance planning and assessing potential risk areas - First Response – responding in the critical first hours and days to minimize the long-term impact - Resolution Strategy – managing various actions stemming from the crisis to enable the best resolution for the company.

Women, Influence & Power in Law Conference

$65

Add to Cart
Previous Next