By browsing this site, you are agreeing to our cookie policy. More Information

New Track at CEIC 2015 Targets Critical Executive-level Legal and Security Issues

Security | Mar 25, 2015

The explosion of threats in digital forensics and security is pressuring executives to anticipate, assess, and respond with greater assurance and insight than ever before.  Because of this, CEIC® 2015 has developed a new “Topics in Management” conference track for business leaders responsible for legal, security, and risk and compliance initiatives.

The new track expands upon the success of the annual CISO/CLO Summit and is packed with an all-star roster of speakers and topics. We’re eager to share some of the highlights of the management track with you in this blog, but encourage you to review the complete CEIC 2015 conference agenda with session descriptions and speaker bios for all 12 tracks.


Management Strategies to Help Mitigate Foreign Attacks

Bookending the management track are two powerful speakers you won’t want to miss. Assistant U.S. Attorney and National Cyber Security Specialist Edward J. McAndrew will kick off the first day by demonstrating the prevalence of borderless cyber crime and how victimized organizations can apprehend and prosecute foreign cyber criminals to help mitigate the long-term cyber threat. Expanding on the same topic, Law & Forensics General Counsel Daniel Garrie wraps up the last day in a session that explains how to react to attacks perpetrated by sovereign nations from the legal, business, and security viewpoints.

Both of these speakers bring a significant amount of legal acclaim to the CEIC program. As the Cybercrime Coordinator and National Security Cyber Specialist in the U.S. Attorney’s Office for the District of Delaware, Mr. McAndrew authored the Supreme Court Commission’s “Leading Practices: Data Security,” the first set of data security practices published by a state bar. He will share case studies of the first U.S. convictions of China-based and other foreign cybercriminals.

Mr. Garrie is the Editor-in-Chief and founder of the Journal of Law and Cyber Warfare, and has co-authored a number of books, including, “Plugged In: Guidebook to Software and the Law, Dispute Resolution and E-Discovery,” and “Cyber Warfare: Understanding the Law, Policy and Technology.”


Management Panels Share Thought Leadership on IP Theft, Cloud-based Risks, and E-Discovery

CEIC has always attracted speakers who are leading practitioners and thought leaders from around the globe, and the new management track is packed with high-caliber presenters.  We’ve worked hard to create three high-level panel discussions that directly address executive challenges:
  • IP Theft from In-House to Courtroom
  • Managing Business Risks in the Cloud
  • E-Discovery from Three Perspectives: Corporate, Discovery Services, and a Law Firm
These topics are balanced with a strategic mix of industry authorities to bring unbiased and unrivaled perspectives to each panel. They include:
  • 451 Research’s David Horrigan, an industry analyst, attorney and award-winning journalist
  • Innovative Discovery’s Joseph Martinez, a U.S. Army veteran who served as a Counterintelligence Special Agent tasked with neutralizing threats to U.S. Department of Defense information systems.
  • Executives from leading cloud service providers LinkedIn and DropBox and the world’s largest oilfield services company, Schlumberger Limited, to share personal, real-world case studies and best practices alongside legal pundits to shed light on counsel’s frame of reference.
This is just a snapshot of the 11 management sessions that include lectures, panels, and roundtable discussions on a variety of executive-level topics on reducing data-related risk in the enterprise. We’ll blog more about other conference topics and speakers in weeks to come.

Visit the CEIC event website for information on the current event agenda, registration information, sponsor and exhibitor opportunities, and register now. Also, be sure to follow us on FacebookTwitter, and LinkedIn for the latest CEIC buzz and conversation. 
Load more comments
Thank you for the comment! Your comment must be approved first
comment-avatar

You May Also Like

Security

EnForce Risk Manager: Redefining Data Privacy & Co...

Have you ever asked yourself if your organization has control over its data?
Feb 4
Security

Finding those Easter Eggs?

We don't mean to egg you on... well, in fact, we do.
Nov 3