Kentucky Chamber To Host Cyber Security Seminar on December 17, 2015

KY Chamber Cyber Security Seminar 2015

Data privacy and security issues are bursting at the seams in ALL industry sectors due to the ability to connect to the internet through networks, apps and a multitude of devices that enable individuals and organizations to collect, transmit, store and use information in a multitude of ways.  Connecting to the internet poses privacy and security risks regarding confidential information that, if used or disclosed in certain ways, can result in significant financial and reputational harm to the entity, its employees, clients, customers and others.

  • Is your company counting on you to make sure it doesn’t have a data breach and end up on the front page?
  • Do you know the latest ways that cyber thieves are trying to gain access to your data?
  • Are you learning from others’ mistakes, so that your company doesn’t have to learn the hard way?
  • Are your policies in step with state and federal laws and regulations as well as government enforcement trends?
  • Do you have a plan for dealing with the financial hit that would accompany a data breach?

If these questions have been weighing on you, as your company’s CEO, CFO, IT manager, HR manager, in-house counsel or risk officer, come to a one-day conference on December 17, 2015, in Lexington, Kentucky, hosted by the Kentucky Chamber of Commerce and sponsored by Wyatt, Tarrant & Combs, LLP.  Learn about trends in security, legal compliance, risk management and law enforcement on cyber security and data protection and gain practical, hands-on information that you can take back to your company, which will begin paying dividends right away.  Topics and speakers include:

  • Protecting sensitive information stored in the cloud from cyber threats, by David Kidd, VP of Governance, Risk and Compliance, Peak 10
  • FBI’s role in cybercrime, by Dan Jackman, Detective, Cyber Crimes Task Force, Federal Bureau of Investigations
  • Developing a company data privacy and security policy and program, by Kathie McDonald-McClure, Partner, Wyatt, Tarrant & Combs, LLP
  • Key Provisions in Agreements with Your IT Vendors, by Lisa Underwood, CIPP/US, Partner, Wyatt Tarrant & Combs LLP
  • Insurance coverage for cyber liability and cyber crime, by Sandra Carroll, Midwest Regional Management and Professional Services Director, USI Insurance Services, LLC
  • Hidden costs of large data breaches, by Hayden M. McKaskle, Director, Cyber Security and Data Breach Notification, Kroll Associates, Inc.
  • Data protection enforcement authority of the FTC, by Martha Ziskind, Counsel, Wyatt, Tarrant & Combs, LLP
  • Breaking developments in cyber privacy law, by Dayo Seton, Attorney, Wyatt, Tarrant & Combs, LLP, and by Lisa Underwood, CIPP/US, Partner, Wyatt, Tarrant & Combs, LLP

For further details on content and speakers, click here to view the Agenda and Brochure. For information on registration, location and lodging, click here.

Leave a reply. Please note that although this blog may be helpful in informing clients and others who have an interest in information privacy and security, it is not intended to be legal advice. The information on this blog also should not be relied upon to form an attorney-client relationship.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s