Materials — Incident Response Forum 2018

Materials by Topic

I. Data Breach Response/the In-House Team/The Board

Yahoo’s Warning to GCs: Your Job Description Just Expanded (Big-Time), by David Fontaine and John Reed Stark (March 2017) (https://www.linkedin.com/pulse/yahoos-warning-gcs-your-job-description-just-expanded-john-reed-stark )

Boards of Directors and Cybersecurity: Applying Lessons Learned From 70 Years of financial Reporting Oversight, by David Fontaine and John Reed Stark (Cybersecurity Docket, 2016) (http://www.cybersecuritydocket.com/2016/01/12/boards-of-directors-and-cybersecurity-applying-lessons-learned-from-70-years-of-financial-reporting-oversight/)

Cyber Awareness to Cyber Expertise: The Evolution of Board Cyber Risk Management by Phyllis Sumner and Nick Oldham (Directors Governance Center, 2016) (https://www.kslaw.com/blog-posts/cyber-awareness-to-cyber-expertise-the-evolution-of-board-cyber-risk-management)

Notes from a Law Firm Chief Privacy Officer: New Demands by Phyllis Sumner (Law 360, August 2017) (https://www.kslaw.com/attachments/000/005/221/original/8-14-17_Law360.pdf?1502739117)

Cyber Alert: 2016 Breach Roundup, Part I: U.S. State Data Breach Notification Laws Highlights and Trends (Alston & Bird, December 2016) (https://www.alston.com/en/insights/publications/2016/12/icyber-alerti-2016-breach-roundup-part-i-us-state)

Four Part Series: Top Cybersecurity Concerns for Every Board of Directors, by John Reed Stark (NASDAQ Governance Clearing Center) (https://listingcenter.nasdaq.com/ClearinghouseArticle.aspx?mtrlid=1375)

New York Cybersecurity Rules: What Firms Need to Know, by Kimberly Peretti and   Nameir Abbas (Securities Regulation, Daily, 2017) (https://www.alston.com/-/media/files/insights/publications/2017/05/alston-nydfs-cyber-update.pdf)

Cybersecurity: The SEC’s Wake-up Call to Corporate Directors, by John Reed Stark  (https://www.johnreedstark.com/publications/cybersecurity-secs-wake-call-corporate-directors/)

 

II. Managing Retail Data Breaches

Amazon Unfair Practice Case May Affect Data Breach Cases, by Doug Meal, David Cohen and Joseph Cleemann (Law 360, July 2016) (https://www.johnreedstark.com/wp-content/uploads/sites/180/2017/03/Amazon-Unfair-Practice-Case-May-Affect-Data-Breach-Cases-Law360.pdf)

Recent Decisions Highlight Product Cybersecurity Issues, by Heather Sussman, Doug Meal and David Cohen (Law 360, 2016) (https://www.law360.com/articles/863307/recent-decisions-highlight-product-cybersecurity-issues)

St. Joseph Demonstrates Challenges for Breach Plaintiffs, By Doug Meal, Mark Szpak and David Cohen (Law 360, 2015) (https://www.law360.com/privacy/articles/625601/st-joseph-demonstrates-challenges-for-breach-plaintiffs)

Cyber Alert: Security Vulnerabilities: You Don’t Need a Breach to Face Regulatory Scrutiny (Alston & Bird, September 2016) (https://www.alston.com/en/insights/publications/2016/09/icyber-alerti-security-vulnerabilities-you-dont-ne)

 

III. Managing Financial Firm Data Breaches

New York State Cybersecurity Regulations: First milestone in sight, what is next on the horizon? By Jeewon Serrato (contributor among several colleagues) (http://www.shearman.com/en/newsinsights/publications/2017/08/nystate-cybersecurity-regulations)

8 Critical Lessons From Morgan Stanley Cybersecurity Case, by John Reed Stark (October 2016) (https://www.linkedin.com/pulse/key-takeaways-from-sec-morgan-stanley-cybersecurity-action-stark/?published=u)

SEC Pushes New Limits on Cybersecurity, Securities Fraud, by John Reed Stark (Compliance Week, 2016) (https://www.johnreedstark.com/wp-content/uploads/sites/180/2015/08/Stark-Outsider-Trading-Article.pdf)

Avoiding Vanguard’s Cybersecurity Stumble, by John Reed Stark (Compliance Week 2016) (https://www.johnreedstark.com/wp-content/uploads/sites/180/2016/03/Avoiding-Vanguard’s-cyber-security-stumble-Compliance-Week-2.pdf)

Cyber Alert: NY Governor Cuomo Announces Final NYDFS Cybersecurity Regulations (Alston & Bird, March 2017) (https://www.alston.com/en/insights/publications/2017/03/governor-cuomo-announces-cybersecurity-regulations)

NYDFS issues final cybersecurity regulations, setting new industry standard for cybersecurity controls (Sidley, February 2017) (http://datamatters.sidley.com/nydfs-issues-final-cybersecurity-regulations-setting-new-industry-standard-cybersecurity-controls/)

Beyond Disclosure: SEC Reinforces Public Company Cybersecurity Obligations (Willkie Farr & Gallagher 2018) (http://www.willkie.com/~/media/Files/Publications/2018/02/Beyond_Disclosure_SEC_Reinforces_Public_Company_Cybersecurity_Obligations.pdf)

Virtual Currency Update: Increased Government Scrutiny and Enforcement (Willkie Farr & Gallagher 2018) (http://www.willkie.com/~/media/Files/Publications/2018/04/Virtual_Currency_Update_Increased_Government_Scrutiny_and_Enforcement.pdf)

 

IV. National Security and Cyber-Attacks

Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threatsby John Carlin (Harvard National Security Journal, 2016) (http://harvardnsj.org/wp-content/uploads/2016/06/Carlin-FINAL.pdf)

Opinion: Here’s how the Trump administration needs to boost cybersecurity, by John Carlin (Marketwatch 2017) (https://www.marketwatch.com/story/heres-how-the-trump-administration-needs-to-boost-cybersecurity-2017-02-16)

Petya Ransomware Attacks, by Debevoise (Including Luke Dembosky) (https://www.debevoise.com/~/media/files/insights/publications/2017/06/20170628_petya_ransomware_attacks.pdf)

The Truth About the Russians and the Elections, by John Reed Stark (Law 360, 2016) (https://www.linkedin.com/pulse/truth-russians-elections-john-reed-stark/?trk=mp-author-card)

Cybersecurity Requirements Clarified (National Defense, March 2017) (https://www.cov.com/-/media/files/corporate/publications/2017/03/cybersecurity_requirements_clarified.pdf)

IMPLICATIONS OF WIKILEAKS PUBLISHING DETAILS OF CIA’S  CYBER ARSENAL (Ankura Consulting Group, March 2017) (https://ankura.com/insights/implications-wikileaks-publishing-details-cias-cyber-arsenal/)

The Risk in Making a Ransomware Payment by John Reed Stark (Law 360, 2017) (https://www.johnreedstark.com/wp-content/uploads/sites/180/2017/07/The-Risks-In-Making-A-Ransomware-Payment-Law360.pdf)

Here’s what went wrong for Equifax in those first 48 hours by John Carlin and David Newman (Aspen institute, 2017) (https://www.cnbc.com/2017/09/13/heres-what-went-wrong-for-equifax-in-those-first-48-hours-commentary.html)

 A GDPR Primer For U.S.-Based Cos. Handling EU Data: Part 1 (By Caroline Krass, et al) (Law 360, 2017) (https://www.gibsondunn.com/wp-content/uploads/2017/12/Krass-Kleinwaks-Baladi-Bartoli-A-GDPR-Primer-For-US-Based-Cos-Handling-EU-Data-Part-1-Law360-12-12-2017.pdf)

A GDPR Primer For U.S.-Based Cos. Handling EU Data: Part 2 (By Caroline Krass, et al) (Law 360, 2017) (http://www.gibsondunn.com/publications/Documents/Krass-Baladi-Kleinwaks-Bartoli-A-GDPR-Primer-For-US-Based-Cos-Handling-EU-Data-Part-2-Law360-12-13-2017.pdf)

Ten Crypto-Caveats Floyd Mayweather and DJ Khaled Should Have Heard From Their Lawyers, by John Reed Stark (https://www.johnreedstark.com/publications/ten-crypto-caveats-floyd-mayweather-dj-khaled-heard-lawyers/)

A Dozen Obvious (and Not So Obvious) C-Suite Takeaways from the 2018 SEC Cyber-Disclosure Guidance, by John Reed Stark (https://www.johnreedstark.com/publications/dozen-obvious-not-obvious-c-suite-takeaways-2018-sec-cyber-disclosure-guidance/)

Think the SEC EDGAR Data Breach Involved Insider Trading? Think Again, by John Reed Stark (https://www.johnreedstark.com/publications/think-sec-edgar-data-breach-involved-insider-trading-think-2/)

“Cybervandalism” or “Digital Act of War”? America’s Muddled Approach to Cyber Incidents Won’t Deter More Crises, by Charlie Dunlap (Lawfire 2017) (https://sites.duke.edu/lawfire/2017/09/15/are-cyber-norms-as-to-what-constitutes-an-act-of-war-developing-as-we-would-want/)

Are Cyber Norms as to What Constitutes an “Act of War” Developing as we Would Want?, by Charlie Dunlap (Lawfire 2017) (https://sites.duke.edu/lawfire/2017/09/15/are-cyber-norms-as-to-what-constitutes-an-act-of-war-developing-as-we-would-want/)

 

V. Managing Data Breaches Across Borders

White House Releases Vulnerability Equities Policy and Processes, by David Fagan and Caitlan Meade (Inside Privacy 2017) (https://www.gibsondunn.com/wp-content/uploads/2017/12/Krass-Kleinwaks-Baladi-Bartoli-A-GDPR-Primer-For-US-Based-Cos-Handling-EU-Data-Part-1-Law360-12-12-2017.pdf)

Microsoft-Ireland: Decision underscores tension between privacy principles and the digital environment, by Squire Patton Boggs (Tara Swaminatha) (JD Supra 2016) (https://www.jdsupra.com/legalnews/microsoft-ireland-decision-underscores-31455/)

Presidential Cybersecurity Commission Issues Ambitious Policy Roadmap for Next Administration, by Benjamin Powell, Jonathan Cedarbaum and D. Reed Freeman (WilmerHale 2016) (https://www.wilmerhale.com/pages/publicationsandnewsdetail.aspx?NewsPubId=17179883360)

Ensuring Best Practices in the Investigation of an Incident, by David Fagan, Ashden Fein and David Bender (Cybersecurity Law and Practice Report, 2016) (https://www.co/media/files/corporate/publications/2016/03/ensuring_best_practices_in_the_investigation_of_an_incident.pdf)v.com/)

2016 Privacy Year In Review, by Winston & Strawn LLP (Feb. 2017) (https://www.winston.com/images/content/1/1/v2/119715/PrivacyYIR.pdf)

Cyber Alert: 2016 Breach Roundup, Part II: U.S. and EU Data Breach Notification Regulations Highlights and Trends (Alston & Bird, January 2017) (https://www.alston.com/en/insights/publications/2017/01/icyber-alerti-2016-breach-roundup-part-ii-us-and-e)

 

VI. After the Breach: Digital Forensics and Remediation

Cybersecurity Preparedness & Response Alert: Effective Cybersecurity: You Have a Breach Response Plan … Now How Do You Test It? (Alston & Bird, December 2015) (https://www.alston.com/en/insights/publications/2015/12/icybersecurity-preparedness–response-alerti-effec)

Takeaways, Reminders & Caveats From the Equifax and SEC Data Breaches by John Reed Stark (Cybersecurity Docket and D&O Diary, 2017) (https://www.linkedin.com/pulse/takeaways-reminders-caveats-from-equifax-sec-data-breaches-stark/)

Hidden Legal Lessons from Anthony Weiner’s Laptop by John Reed Stark (Cybersecurity Docket, 2017) (https://www.linkedin.com/pulse/hidden-legal-lessons-from-anthony-weiners-laptop-computer-stark/?trk=hp-feed-article-title-publish%27)

 

VII. After the Breach: Cyber Insurance and Class Actions

High Hurdles Faced by Data Security Breach Shareholder Derivative Plaintiffs by Douglas Meal, Mark Szpak, David Cohen and Lindsey Sullivan (Bloomberg Privacy and Law Review, 2017) (https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjj0OXCm67aAhWnTN8KHfCUDh0QFggyMAA&url=https%3A%2F%2Fwww.ropesgray.com%2F-%2Fmedia%2FFiles%2Farticles%2F2017%2FMay%2FPrivacy-and-Security-Law-Report.pdf%3Fla%3Den%26hash%3DE0052F5CAA77F3523C163D37F80812AC0875F6E0&usg=AOvVaw3ZlLeWQlgLnecvn6FSlvgT)

Cyber Insurance:  How to Find the Right Policy, by John Reed Stark (November 2016) (https://listingcenter.nasdaq.com/Material_Search.aspx?materials=1240&mcd=CH&cid=125,126,107,128,37,129,20,130,131,132,135,133,134&sub_cid=&years=2016,2015,2014,2016,2015,2014,2013,2012,2011,2010,2009,2008,2007,2006,2005,2004,2003,2002&criteria=2)

5 Tips for Buying and Reviewing Cyber Insurance, by Scott Godes (Law 360, 2014) (http://www.btlaw.com/files/Uploads/Documents/Publications/5 Tips For Reviewing_Godes.pdf)

How Insurance Can Protect Your Company, by Scott Godes (Law Journal Newsletter, 2016) (http://www.btlaw.com/files/Uploads/Documents/Publications/Cybersecurity article – ALM text version 031215.pdf)

Should Retailers Rely On CGL Coverage For Data Breaches? By: Scott Godes (Barnes & Thornburg 2015) (http://www.btpolicyholderprotection.com/should-retailers-rely-on-cgl-coverage-for-data-breaches/)

Who Gets Coverage? Cyber Insurance and Credit Card Risks: Will Coverage Apply After the P.F. Chang’s Denial? By: Scott Godes (Barnes & Thornburg 2017) (http://www.btpolicyholderprotection.com/cyber-insurance-and-credit-card-risks-will-coverage-apply-after-the-p-f-changs-denial/)

Cyber-Physical Risks: Are You Covered? (Covington, December 2016) (https://www.cov.com/-/media/files/corporate/publications/2016/12/cyber_physical_risks_are_you_covered.pdf)

 

VIII. Breach Avoidance/Preparation: Counseling Companies Before the Inevitable Breach 

Cybersecurity Preparedness & Response Alert:  Effective Cybersecurity: The Evolving Regulatory Landscape for Investment Advisers, Investment Companies and Broker-Dealers, by Alston and Bird (Including Kimberly Kiefer Peretti)  (JDSupra Business Advisor, 2016) (https://www.jdsupra.com/legalnews/cybersecurity-preparedness-response-30651/)

Top Cybersecurity Concerns for Every Board of Directors, Part One: Cybersecurity Governance, by John Reed Stark (NASDAQ Clearinghouse, December 2016) (https://listingcenter.nasdaq.com/ClearinghouseArticle.aspx?mtrlid=1284)

Alternative Communications Planning and Cybersecurity Incident Response, by Tara Swaminatha (CSO 2018) (https://www.csoonline.com/article/3268227/data-protection/alternative-communications-planning-and-cybersecurity-incident-response.html)

Cybersecurity: Past is Prologue, by Squire Patton Boggs (Tara Swaminatha) (JD Supra 2016) (https://www.jdsupra.com/legalnews/cybersecurity-past-is-prologue-95506/)

Presidential Executive Order on Cybersecurity: No More Antiquated IT, by Jonathan Meyer, John Chierichella and Townsend Bourne (Bloomberg BNA Privacy and Law Report, 2017) (https://www.sheppardmullin.com/media/article/1651_SheppardMullin CyberEO 16PVLR742.pdf)

How a Consumer Group’s Cybersecurity Initiative Could Shape the Market, by Dave Thonas, Jonathan Meyer and Abraham Shanedling (Morning Consult, 2017) (https://morningconsult.com/opinions/consumer-groups-cybersecurity-initiative-shape-market/)

Connecting the Dots: Key Developments and Best Practices for Evaluating Privacy and Security Risks in lot Investments by Jeewon Serrato (Shearman and Sterling, 2017) (http://www.shearman.com/en/newsinsights/publications/2017/09/key-developments-evaluating-privacy-security-risks)

NY Cybersecurity Bill Shows “Reasonable Security” Standard Gathering Force by Debevoise (Including Luke Dembosky) (Debevoise and Plimpton, 2017) (https://www.debevoise.com/~/media/files/insights/publications/2017/11/20171107 ny_cybersecurity_bill_shows_reasonable_security_standard_gathering_force.pdf)

Details

When: Wednesday, April 18, 2018
7:00 am - 8:15 am (breakfast & registration)
8:15 am - 5:00 pm (followed by cocktail party)
Where: Mayflower Hotel
1127 Connecticut Ave, NW
Washington, D.C. 20036
CLE Credit: 6.0 hours (approved in VA and PA)

CLE Info and Forms

SEF2014 CLE -smCLE forms available here.

Materials

Links to materials available here.

Corporate Sponsors

Kroll

Ankura 230x60

CrypsisLogo

Freeh Group 230

JRS230

ACA Aponix 230

Academic Sponsor: Duke Law

Duke LENS 230

Law Firm Sponsors

Alston 230 v2

Baker230

BakerMcKenzie230

BarnesThornburg230

cov230x60

Debevoise230v2

Dickinson230

ks230v2

McDonald Hopkins 230

mofologo230x60

O'Melveny 230

Ropes &Gray

SheppardMullin 230

Sidley

Willkie 230