FireEye | Digital Risk Roundtable

Deal with Digital Risk before An Incident Occurs
Thursday, May 9, 2019 | Columbus, OH
BakerHostetler Office

According to the FBI, the cost of cyber crime in the United States grew from $264 million in 2007 to $1.4 billion in 2017. The ability to proactively manage your digital risk can have a huge impact on your cyber security posture and your bottom line.

Come join us in Columbus, Ohio, on Thursday, May 9, when a panel of experts from BakerHostetler, the FBI, CBTS and FireEye Mandiant will discuss the nature, types and stages of digital risks, as well as how you can become digital risk compliant.

You’ll discover not only how your organization can proactively assess its security posture and mitigate risk, but also how to prepare to respond to incidents. Topics covered include:

  • Proactive security—red teams, pen tests, compromise assessments, tool deployment, log tuning
  • Digital risk compliance—legal and contractual obligations and definitions of reasonable security
  • Preparation—incident response plans, tabletop exercises, relationship building with law enforcement

Discussion Topics Details

  1. What can your organization do before an incident to assess your security posture and mitigate risk?

    • Proactive security – red teams, pen tests, compromise assessments
    • Digital risk compliance – complying with legal and contractual obligations – identifying what is reasonable security
    • Internal – prioritizing efforts to mature security posture

  2. What should your organization do before an incident to be better prepared to respond?

    • Security – engagement, tool deployment, log tuning, run books (Mandiant)
    • Legal – Incident Response Plan (Hoffman)
    • Internal – (Cronin)
    • Law enforcement – relationship building before an incident, role during an incident (FBI)
    • All – tabletop exercises

Agenda:

8:00 – 8:30 a.m. |  Continental Breakfast and Registration 
8:30 – 10:00 a.m. |  Assessing your security posture
Preparing for a breach
Responding to a breach 
10:00 a.m. |  Wrap-up and Questions



Location:

BakerHostetler Office
200 Civic Center Drive
Suite 1200
Columbus, OH 43215-4138

Speakers:

BakerHostetler - Craig A. Hoffman – Partner
Craig provides proactive counsel on the complex regulatory issues that arise from data collection and use, including customer communications, data analytics, emerging payments, cross-border transfers and security incident response preparedness.

Cincinnati Bell (CBTS) - Leo Cronin, Vice President and Chief Security Officer
Leo is responsible for all aspects of physical and cyber/information security across the company, including governance and security architecture.  Prior to his current role, Mr. Cronin was CISO and VP of Global Information Security at Reed Elsevier/LexisNexis. Mr. Cronin has over 30 years of experience in information and network security and is a Certified Information Systems Security Professional and Information Systems Security Management Professional.

FBI - Special Agent Josh Saltar - Federal Bureau of Investigation, Cincinnati Division - Columbus Regional Agency
Special Agent Josh Saltar joined the FBI in 2014. Prior to joining the FBI, SA Saltar spent four years working as a civilian Intelligence Specialist for the Air Force at the National Air and Space Intelligence Center located at Wright-Patterson Air Force Base, under both the cyber and counterspace squadrons. Since joining the FBI, Special Agent Saltar has been assigned to the Cincinnati Division, Columbus Resident Agency working computer intrusion and cyber terrorism matters.

FireEye Mandiant  - Jim Labiszak - Senior Manager, Central Region Security Services
Jim has 17+ years of experience leading information security efforts at a diverse range of organizations.  He has helped 100+ clients improve their security posture in the areas of security strategy and architecture, incident response and readiness, cyber threat intelligence and data protection and governance.

FireEye Mandiant  - Troy Scavella – Manager, Central Region Security Services
Troy is Information Security practitioner and very much enjoys security work.  He is well versed in the area of C-suite breach response involvement, including a best practice phased approach of executive contributions to be made before, during and after a breach occurs, actionable tips for executives to apply and enforce across each phase of the breach response process and the protection of critical assets with effective breach response preparation and improvements



1.5 CLE Credit Hours Pending in Ohio
In Partnership with:


cbts-logo.png

 

Register Now

video Play Video

VIDEO Title
Some info / descriptions

 

some copy for the video

  • Why alerts are not fool-proof
  • Why having more consoles may not be the answer to your security needs
  • How your IT team may not be prepared to handle critical alerts
  • How long it takes other organizations to respond to alerts, and how you compare
  • Why outsourcing could save you money and mitigate risk