Menu

Sessions & Workshops

Tuesday, February 26, 2013

Wednesday, February 27, 2013

  • Your Honor, it Was Self-Defense—a Mock Trial

    • 8:00am – 9:00am | Room 302 | LAW-W21

    The customer ordering system of Telluria is being continuously attacked from the systems of The Nevia Corporation. Countermeasures are deployed but the attacks continuously morph. Calls are made to…

    Conference Track:
    Participants:
    Hoyt Kesterson II - Senior Security Architect, Terra Verde
    Andrew Peck - U.S. Magistrate Judge, United States District Court for the Southern District of New York
    John Facciola - United States Magistrate Judge, U.S. District Court for the District of Columbia
    Serge Jorgensen - Chief Technology Officer, The Sylint Group
    Stephen Wu - Partner, Cooke Kobrick & Wu LLP
    Steven Teppler - Legal, Abbott Law Group P.A.
  • Your Honor, it Was Self-Defense—a Panel Discussion

    • 9:20am – 10:20am | Room 302 | LAW-W22

    Is “hacking back” ever justified? This panel will discuss the concepts and issues brought up in the previous session’s mock hearing. There are ethics concerns for counsel, possible civil damages for…

    Conference Track:
    Participants:
    Hoyt Kesterson II - Senior Security Architect, Terra Verde
    Andrew Peck - U.S. Magistrate Judge, United States District Court for the Southern District of New York
    John Facciola - United States Magistrate Judge, U.S. District Court for the District of Columbia
    Serge Jorgensen - Chief Technology Officer, The Sylint Group
    Stephen Wu - Partner, Cooke Kobrick & Wu LLP
    Steven Teppler - Legal, Abbott Law Group P.A.
  • Tracking Employees via Mobile Devices - Legal.. or Not?

    • 10:40am – 11:40am | Room 302 | LAW-W23

    With the ubiquity of mobile devices and the coverage of mobile networks, it is not truly possible for employers to track their employees' every move. For corporate-owned devices, used by full-time…

    Conference Track:
    Participants:
    Aaron Turner - Partner, N4Struct
    Randy Sabett - Special Counsel, Cooley LLP
  • Techno-Ethics for Lawyers - How Technology Complicates Ethical Compliance

    • 1:00pm – 2:00pm | Room 302 | LAW-W25

    Lawyers' ethical obligations attach to the use of technology in both practice management and client facing activities. Especially important are those obligations of competency, client confidentiality, …

    Conference Track:
    Participants:
    John Jorgensen - Chief Executive Officer, The Sylint Group
    Andrew Peck - U.S. Magistrate Judge, United States District Court for the Southern District of New York
    Erik Laykin - Managing Director, Duff & Phelps
    Joseph Burton - Partner, Duane Morris LLP
    Serge Jorgensen - Chief Technology Officer, The Sylint Group
    Steven Teppler - Legal, Abbott Law Group P.A.

Thursday, February 28, 2013

  • E-Discovery: Exploring the Rising Star on Your Risk Horizon

    • 8:00am – 9:00am | Room 302 | LAW-R31

    This dynamic session is designed by CISOs for CISOs and explores the impact of e-discovery. Attendees will learn practical tips and valuable lessons about the people, business processes and technology…

    Conference Track:
    Participants:
    Chad McManamy - Assistant General Counsel, Guidance Software
    Andrew Peck - U.S. Magistrate Judge, United States District Court for the Southern District of New York
    Lee Warren - Chief Information Security Officer, United Technologies Corporation
  • Banking Fraud: Where is the Liability – With the Customer, Bank or Vendor?

    • 9:20am – 10:20am | Room 302 | LAW-R32

    When a business banking account is breached, who is liable—the customer whose credentials were stolen, or the bank that failed to catch the transaction? This panel will debate that question and the…

    Conference Track:
    Participants:
    Tracy Kitten - Managing Editor, BankInfoSecurity
    Bill Nelson - President, FS-ISAC
    Dan Mitchell - Litigator, Bernstein Shur
    George Tubin - Global Marketing Program Director, IBM Security
    Joseph Burton - Partner, Duane Morris LLP
  • Cyber Attacks: The Call for Retaliation and the Legal Ramifications

    • 10:40am – 11:40am | Room 302 | LAW-R33

    Cyber attacks from foreign entities have become malicious and potentially destructive, siphoning needed dollars and time from business productivity and causing havoc with companies responsible for…

    Conference Track:
    Participants:
    John Jorgensen - Chief Executive Officer, The Sylint Group
    Charles Shugg - Chief Operations Officer, The Sylint Group, Inc.
    Jon Stanley - Chief Executive Officer, Law Office of Jon Stanley
    Serge Jorgensen - Chief Technology Officer, The Sylint Group
    Stacy Arruda - Supervisory Special Agent, Federal Bureau of Investigation
  • Practical Advice for Cloud Forensics

    • 1:00pm – 2:00pm | Room 302 | LAW-R35

    As the adoption of cloud computing continues to expand, civil and criminal cases are bound to explode. Without case law to learn from, it remains unclear how legal and technical experts will approach…

    Conference Track:
    Participants:
    Aaron Alva - J.D. & Masters Candidate, University of Washington
    Christopher Day - Chief Security Architect and Senior Vice President, Secure Information Systems, Terremark Worldwide, Inc.
    Eric Hibbard - Chief Technical Officer Security & Privacy, Hitachi Data Systems
    Josiah Dykstra - Ph.D. Candidate, UMBC
    Steven Teppler - Legal, Abbott Law Group P.A.

Friday, March 1, 2013

  • Lawyers, Regs and Money: The Breach Has Hit the Fan

    • 9:00am – 10:00am | Room 302 | LAW-F41

    In a layered defense, one layer of protection that seems least understood and most overlooked is in defense of the business. Will cover critical components of, and considerations for, data loss…

    Conference Track:
    Participants:
    Larry Ponemon - Chairman and Founder, Ponemon Institute
    Ellen Giblin - Privacy Counsel, Ashcroft Law Firm
    Gant Redmon - General Counsel, Co3 Systems, Inc.
    Gregory Leffard - Vice President, Professional Liability, The Hartford
  • How the Constitution Protects your Cell Phone and Laptop Encryption Key

    • 10:20am – 11:20am | Room 302 | LAW-F42

    Recent cases have brought the question to light of when a user's privacy rights are violated in their cell phone and encryption passwords. This talk highlights the relevant cases and logic behind the…

    Conference Track:
    Participant:
    Abraham Kang - Director R&D, Samsung
  • Computer Crime Law: Recent Developments

    • 11:40am – 12:00pm | Room 302 | LAW-F43

    The Computer Fraud and Abuse Act has been expanded into a powerful tool for the government and others to sue people for computer "misuse" A recent case involved a prosecution of a person who created a…

    Conference Track:
    Participant:
    Chris Hoofnagle - Lecturer in Residence, UC Berkeley Law

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions on Thu, 30 Jul 2015 21:03:50 -0400.
© 2015 EMC Corporation. All rights reserved.