Jon C. Stanley, Counsel, Verrill Dana LLP to Speak at the Knowledge Group's Cyber Security Breaches: Consequences for Your Firm in 2016 and Beyond Live Webcast
New York, NY, November 25, 2015 --(PR.com)-- The Knowledge Group/The Knowledge Congress Live Webcast Series, the leading producer of regulatory focused webcasts, has announced today that Jon C. Stanley, Counsel, Verrill Dana LLP will speak at the Knowledge Group’s webcast entitled: “Cyber Security Breaches: Consequences for Your Firm in 2016 and Beyond.” This event is scheduled for December 1, 2015 from 12:00pm – 2:00pm (ET).
For further details, please visit: http://theknowledgegroup.org/event_name/cyber-security-breaches-consequences-for-your-firm-in-2016-and-beyond-live-webcast/
Event Synopsis:
Many businesses and organizations will continue to be at great risk of losing large amounts of confidential data to well organized and sophisticated cyber criminals. Such breaches will have serious financial, legal, regulatory, and reputational consequences.
Breaches of information security and individual privacy continue to increase in severity and frequency. In 2014, several companies were cracked* and many more hacked. In August 2014, a breach of Community Health Records resulted in theft of 4.5 million records of patients, and in November 2014, Staples, Inc. was cracked resulting in the theft of 1.2 million credit and debit card records.
Fundamentally, these breaches represent a lack of education of the public regarding basic security, a lack of diligence of companies regarding their own and their customer’s security, and the sophistication of crackers many of whom increasingly are part of sophisticated national and international criminal groups.
Cyber security risks include new malware in older computer code, such as Heartbleed / OpenSSL and Shellshock / Bash, exploitable flaws in the IPv6 protocol, rootkits, bootkits, and bots (which the US government uses to spy on the public), espionage ware, ransomware, third party attacks, and malvertising. Crackers and state sponsored or politically motivated attackers also will continue to use more sophisticated methods of evasion and diversion. At risk of attack are Mobile to Mobile communications in automated industries like power generation and oil or gas extraction, new wearable technologies, infrastructure of The Internet of Things, big data and analytics servers (‘salami attacks’), cloud services, mobile technology, social networks, retail sales and payment systems (ATM), open source software, and web technology. In addition, anonymous data being collected through social networks, security cameras, creditcard transactions, and other means can be united sufficiently to pose a threat to individuals, corporations, and governments. However, a significant and rapidly emerging risk is the Personally Identifiable Information (PII) stored by healthcare organizations.
In a two hour live Webcast, a panel of thought leaders and professionals assembled by The Knowledge Group will discuss the methods used in Cyber Security Breaches with emphasis upon the Consequences for Your Firm in 2015 and beyond. In addition, speakers will provide insight into the latest trends and best practices in mitigating and dealing with Cyber Security Breaches.
* Cracker – A computer hacker who carries out illegal and malicious breach of computer systems to steal or damage property.
Key topics include:
− Growth and Development of Cyber Security Breaches
− Understanding the Goals of Breach Perpetrators
− Understanding the Principal Cyber Security Vulnerabilities
− Cyber Security Breach Methods of Attack
− Understanding the Real Financial, Legal, and Reputational Risks of a Breach
− How to Identify Your Particular Breach Vulnerabilities and Risks
− How to Best Reduce Your Risks From A Breach
− Avoiding Common Failures & Pitfalls
− Overview and Direction of Cyber Security Litigation
About Jon Stanley
For the past 20 years, Jon Stanley has counseled clients on a wide range of risk management and cybersecurity issues, including: compliance with relevant international, federal and state laws and regulations, government and industry standards (such as NIST and PCI), authentication, Public Key Infrastructure, identify theft and security breaches. His clients have included the State of Maine, major financial institutions, including: Financial Services Technology Consortium (FSTC); Japan’s Ministry of Economy, Trade and Industry; a number of technology startups: CNA Insurance; and health care sector vendors, nationwide.
Jon earned his J.D. from University of Maine, and he has a Master’s in Law from the University of Strathclyde, in Scotland, where his dissertation topic was “Civil Remedies: The United States Computer Fraud and Abuse Act.”
About Verrill Dana LLP
Verrill Dana is a full service law firm with more than 130 attorneys and a growing number of service-based practice groups. The firm has a regional presence in the Northeast, with offices from Maine to Washington, D.C., allowing it to serve clients with interests across the country and around the world. Through scalable staffing, careful communication and skillful project management, Verrill Dana helps individuals and businesses achieve their goals in a manner that suits their unique legal needs and preferred work methods.
Verrill Dana embraces the principles behind the Association of Corporate Counsel Value Challenge. It is committed to providing value-driven, quality legal services and practical solutions in a cost-effective manner. Its lawyers are not satisfied being only quality service providers. They strive to earn the status of trusted counsel, advocates and allies in their clients' success.
About The Knowledge Group/The Knowledge Congress Live Webcast Series
The Knowledge Group was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register for an event, please visit: http://theknowledgegroup.org
For further details, please visit: http://theknowledgegroup.org/event_name/cyber-security-breaches-consequences-for-your-firm-in-2016-and-beyond-live-webcast/
Event Synopsis:
Many businesses and organizations will continue to be at great risk of losing large amounts of confidential data to well organized and sophisticated cyber criminals. Such breaches will have serious financial, legal, regulatory, and reputational consequences.
Breaches of information security and individual privacy continue to increase in severity and frequency. In 2014, several companies were cracked* and many more hacked. In August 2014, a breach of Community Health Records resulted in theft of 4.5 million records of patients, and in November 2014, Staples, Inc. was cracked resulting in the theft of 1.2 million credit and debit card records.
Fundamentally, these breaches represent a lack of education of the public regarding basic security, a lack of diligence of companies regarding their own and their customer’s security, and the sophistication of crackers many of whom increasingly are part of sophisticated national and international criminal groups.
Cyber security risks include new malware in older computer code, such as Heartbleed / OpenSSL and Shellshock / Bash, exploitable flaws in the IPv6 protocol, rootkits, bootkits, and bots (which the US government uses to spy on the public), espionage ware, ransomware, third party attacks, and malvertising. Crackers and state sponsored or politically motivated attackers also will continue to use more sophisticated methods of evasion and diversion. At risk of attack are Mobile to Mobile communications in automated industries like power generation and oil or gas extraction, new wearable technologies, infrastructure of The Internet of Things, big data and analytics servers (‘salami attacks’), cloud services, mobile technology, social networks, retail sales and payment systems (ATM), open source software, and web technology. In addition, anonymous data being collected through social networks, security cameras, creditcard transactions, and other means can be united sufficiently to pose a threat to individuals, corporations, and governments. However, a significant and rapidly emerging risk is the Personally Identifiable Information (PII) stored by healthcare organizations.
In a two hour live Webcast, a panel of thought leaders and professionals assembled by The Knowledge Group will discuss the methods used in Cyber Security Breaches with emphasis upon the Consequences for Your Firm in 2015 and beyond. In addition, speakers will provide insight into the latest trends and best practices in mitigating and dealing with Cyber Security Breaches.
* Cracker – A computer hacker who carries out illegal and malicious breach of computer systems to steal or damage property.
Key topics include:
− Growth and Development of Cyber Security Breaches
− Understanding the Goals of Breach Perpetrators
− Understanding the Principal Cyber Security Vulnerabilities
− Cyber Security Breach Methods of Attack
− Understanding the Real Financial, Legal, and Reputational Risks of a Breach
− How to Identify Your Particular Breach Vulnerabilities and Risks
− How to Best Reduce Your Risks From A Breach
− Avoiding Common Failures & Pitfalls
− Overview and Direction of Cyber Security Litigation
About Jon Stanley
For the past 20 years, Jon Stanley has counseled clients on a wide range of risk management and cybersecurity issues, including: compliance with relevant international, federal and state laws and regulations, government and industry standards (such as NIST and PCI), authentication, Public Key Infrastructure, identify theft and security breaches. His clients have included the State of Maine, major financial institutions, including: Financial Services Technology Consortium (FSTC); Japan’s Ministry of Economy, Trade and Industry; a number of technology startups: CNA Insurance; and health care sector vendors, nationwide.
Jon earned his J.D. from University of Maine, and he has a Master’s in Law from the University of Strathclyde, in Scotland, where his dissertation topic was “Civil Remedies: The United States Computer Fraud and Abuse Act.”
About Verrill Dana LLP
Verrill Dana is a full service law firm with more than 130 attorneys and a growing number of service-based practice groups. The firm has a regional presence in the Northeast, with offices from Maine to Washington, D.C., allowing it to serve clients with interests across the country and around the world. Through scalable staffing, careful communication and skillful project management, Verrill Dana helps individuals and businesses achieve their goals in a manner that suits their unique legal needs and preferred work methods.
Verrill Dana embraces the principles behind the Association of Corporate Counsel Value Challenge. It is committed to providing value-driven, quality legal services and practical solutions in a cost-effective manner. Its lawyers are not satisfied being only quality service providers. They strive to earn the status of trusted counsel, advocates and allies in their clients' success.
About The Knowledge Group/The Knowledge Congress Live Webcast Series
The Knowledge Group was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register for an event, please visit: http://theknowledgegroup.org
Contact
The Knowledge Group
Thomas LaPointe, Jr., Executive Director
1.800.578.4370
www.theknowledgegroup.org
Therese Lumbao, Director
Account Management & Member Services
tlumbao@knowledgecongress.org
Contact
Thomas LaPointe, Jr., Executive Director
1.800.578.4370
www.theknowledgegroup.org
Therese Lumbao, Director
Account Management & Member Services
tlumbao@knowledgecongress.org
Categories