Loading…
cyber [clear filter]
Tuesday, October 13
 

9:20am CDT

Preparing for a Data Breach Crisis: How to Run A Table Top Exercise
Where there is data there is risk, and with ever increasing and evolving cybersecurity threats, data breaches have become fact of life and cost of doing business. With new regulatory requirements and legal precedents for liability in cases of breach, corporate well-being in 2015 will depend greatly on how organizations respond to the inevitable. Cybercrime is outpacing cyber security resulting in data breaches despite best efforts. Breaches have become an enterprise risk issue, and involving the board in breach risks early on will help from a governance perspective.

This session will outline how to develop and create the setting to run an effective data breach incident response test scenario. The scenario will incorporate actions companies can take to not only manage and handle a data breach to mitigate risk and better protect themselves and their customers, but also to streamline the incident response process. This session will walk attendees through the upfront preparation necessary to help boost defenses in the security-and-risk game, including the key strategies to mitigate breach risks. The session will explore a more methodical approach to breach preparedness and response that can help meet compliance requirements, minimize regulatory risks and penalties, protect reputation, and protect customers while making the best use of limited staff and financial resources.

As a result of participating in this session:
 Attendees will learn how to develop and implement a data breach incident response testing event.
 Learn how to reduce enterprise security risks by implementing procedures and processes that correspond with the phases of the incident’s lifecycle.
 Understand and learn how to define the roles and responsibilities of all involved in preparing for and managing data breaches.
 How creating a holistic team will help better align incident response, learn pre-breach planning best practices in order to maximize breach response effectiveness and minimize litigation as well as risks of regulatory fines/penalties.
 Learn take away resolution strategies to use during breach response events.

Speakers
avatar for Douglas Duncan

Douglas Duncan

Senior Assistant University Counsel, Seattle University
Currently Associate University Counsel for Seattle University, working remotely from Madison, WI. Grandpa x4. Graduate of Santa Clara University School of Law ... a long time ago. Lots of legal experience, mostly in private practice as a litigator in commercial, employment, maritime... Read More →
DE

David Evans

Senior Vice President, Public Entity Group, Alliant Insurance Services
David Evans joined the Alliant Insurance Services team in 2008 and currently serves as senior vice president in the public entity group. One of his primary responsibilities is working with the University of California, one of the largest, most complex university systems in the United... Read More →
avatar for James Giszczak

James Giszczak

Member; Vice Chair, Litigation Department, McDonald Hopkins
Mr. Giszczak is vice chair of the litigation department and chair of the data privacy and cyber security practice group. He advises clients regarding data security measures and responding to security breaches involving sensitive personal information and protected health information... Read More →
avatar for Jeremy Henley

Jeremy Henley

Director of Breach Services, ID Experts
Jeremy Henley is the director of breach services for ID Experts, where they bring simplicity to the complex world of privacy incident response. Mr. Henley has direct oversight for all breach services. He has been certified by the Healthcare Compliance Association for healthcare... Read More →


Tuesday October 13, 2015 9:20am - 10:35am CDT
Marquette V Hilton Minneapolis

10:55am CDT

Progressive Mobile Device Management at Hamline University
With the proliferation of mobile devices, Hamline University faced the challenge to manage mobile devices in a way that protects both personal and business data in a reasonable manner. This includes email, document files and other sensitive data. Working collaboratively with Hamline’s safety & security, information technology services, and finance and payroll departments, our progressive mobile device management operation is founded on a combination of policy, process and procedures.

In this presentation, we will share how mobile devices are added to our system in order to accommodate device and data security, as well as discuss the process of recovering a lost device.

As a result of participating in this session attendees will gain practical insight about:
 How a business is managing the use of mobile technology while protecting the interests of the University in terms of data access and utilization.
 How disparate business units have come together to solve a business challenge.
 How Hamline’s business units collaborate to recover lost or stolen equipment.

Speakers
avatar for Dan Musial

Dan Musial

Director of Enterprise Applications and Development, Hamline University
Dan Musial has worked in the IT field for the past 25 years. Dan has held several positions within the IT field including software development, system administration, architecture and design, analysis, and IT leadership. Dan returned to his alma mater, Hamline University, in 1998... Read More →
avatar for Ben Phillip

Ben Phillip

Director of Technical Support Services, Hamline University
Ben Phillip has worked in higher ed continuously since 1997. This includes working in IT at the College of St. Scholastica in Duluth, MN, Concordia University - St. Paul, and currently at Hamline University where he is the director of technical support services. Ben oversees a staff... Read More →
avatar for Jim Schumann

Jim Schumann

Director of Safety & Security, Hamline University
Jim Schumann’s background includes 27 years of working in the campus security and safety field, property management security, security consulting, interrogations and investigations. He is currently the Director of Safety & Security at Hamline University. Director Schumann has been... Read More →
avatar for Dean Stambaugh

Dean Stambaugh

Director, ITS Management Office - Information Technology Services, Hamline University
Dean Stambaugh has more than 30 years of experience in the IT field with competencies in business analysis, project management, data/workflow process engineering, strategic planning and communications. He joined Hamline full-time in 2013 and now as director of the IT services management... Read More →


Tuesday October 13, 2015 10:55am - 12:10pm CDT
Marquette V Hilton Minneapolis

2:15pm CDT

Under Attack: Managing Cyber Risks for Universities
“We are under attack daily”. In fact, Symantec's "2013 Internet Security Threat Report" shows a 42 percent year-over-year increase in the number of data breaches and cyber attacks. The media coverage of cyber risks focuses on retail or financial institutions; however, educational institutions are at risk as well with sensitive financial information, medical information and intellectual property.

This session will cover an overview of the types of cyber threats, why cyber risk is on the rise, what’s at risk for universities, who is behind cybercrime, how to work with IT and other departments to manage risk, and how to recover faster if attacked.

As a result of participating in this session, participants will be able to:
 Take home discussion points and conversation starters to use with their IT and other departments to facilitate open dialogue on their organization's exposure to cyber risk.
 Have a basic framework for categorizing the types of cyber risks.
 Have examples they can share with their organizations about the significant cost and effort of recovering from a breach.

Speakers
avatar for Jason Glasgow

Jason Glasgow

CyberRisk Product Manager, Travelers
Jason has been the cyber risk product manager with Travelers Bond and Financial Products since 2010, responsible for national strategy, forms and marketing for the product. After handling large FI bond and commercial crime claims in the home office for several years, Jason assisted... Read More →
avatar for Brian Kelly

Brian Kelly

Chief Information Security Officer, Quinnipiac University
Brian Kelly joined Quinnipiac University in September 2006 as the information security officer (ISO). He supports Quinnipiac University's commitment to teaching and collaboration by safeguarding information assets against unauthorized use, disclosure, modification, damage or loss... Read More →


Tuesday October 13, 2015 2:15pm - 3:30pm CDT
Marquette V Hilton Minneapolis

3:45pm CDT

Cyber Security, the New Internet, and U
This is a panel discussion exploring the evolving landscape of the new Internet, expansive growth in social media options, challenges students and faculty create when they bring their own devices, and the many new portals this landscape creates for disruptive hacking. Among the panelists is a “white hat” hacker, someone who is hired to purposefully try to infiltrate an institution’s systems to assess and improve security.

As a result of participating in this session, attendees will better understand:
 The ways and means of hacking from a professional hacker.
 The risks and challenges of social media.
 Important considerations with the new Internet.
 The impact on the open flow of information, research and intellectual property.
 Insurance carrier solutions and services (pre-breach and post-breach), marketplace updates and alternative risk management solutions.

Speakers
avatar for Jamie Burnett

Jamie Burnett

Senior Broker, Aon Risk Solutions
Mr. Burnett is a senior broker within Aon’s financial services group, professional risk solutions team. Mr. Burnett manages E&O exposures for middle market clients across the country. Areas of expertise include network security and privacy liability (cyber), technology errors and... Read More →
LE

Loras Even

Principal, McGladrey LLP
HP

Harry Pontiff

Information Security Consultant, Macalester College
Although continuing to serve as a consultant to Macalester College in St. Paul, Harry retired last year after 5 years as the Information Security Officer. His career was devoted entirely to higher education in Minnesota in virtually all of its manifestations. This included 12 years... Read More →
CJ

Charles J. Pruzinsky

Underwriter, Beazley Group
CJ Pruzinsky joined Beazley in May 2014 as an underwriter for the Technology, Media & Business Services team based in the Chicago office. CJ’s focus is on underwriting specialty lines risks such as E&O, media and information security & privacy for middle market and large risk clients... Read More →


Tuesday October 13, 2015 3:45pm - 5:00pm CDT
Marquette V Hilton Minneapolis
 
Filter sessions
Apply filters to sessions.