Cybersecurity Threats, Responses and Legal Challenges

Program Schedule

12:00 P.M. ET

  • Welcome, Introduction of Speakers, & Agenda

  • Privacy Legal Issues and Background
    • What is Privacy?
    • Privacy Laws and Disconnects

  • Identifying Cybersecurity Threats
    • Breach Counts in Education
    • Threat Actors
    • Sample Threats
    • Advanced Persistent Threat
    • Ransomware
    • Spear Phishing

  • Question & Answer Break

  • Preparing for a Cyber Attack
    • Incident Response Plan
    • Policies
    • Privacy Data Inventory
    • Privacy Programs & Technical Controls
    • Data Breach First Responders
    • After a Breach
    • Communicating in Plain Language
    • Cooperation Between IT and General Counsel's Office

  • Insider Threat Prevention Strategies
    • Where Do Your Threats Come From?
    • Who are Your "Insiders"? 
    • What Do You Need to Protect?
    • Types of Insider Incidents
      • Insider IT Sabotage
      • Insider Theft of IP
    • Building an Insider Threat Program

  • Question & Answer Break

2:00 P.M. ET

VIII. Final Takeaways & Concluding Remarks