Summary

   JUNE 11-13, 2018     ARLINGTON, VA
Pre-Summit Workshop: June 11
 
8:00 AM Arlington Reg Desk Registration Open
 
8:00 AM Salon V Foyer Breakfast and Networking
 
9:00 AM Salon V-VI Welcome and Introduction
Dan Liutikas, Peter Lesser, Jeff Brandt, Rina Hunter, Scott Rolf
 
9:20 AM Salon V-VI Deep Dive into Policies and Procedures (Part 1)
What policies and procedures should law firms have?
 
10:00 AM Salon V-VI Deep Dive into Policies and Procedures (Part 2)
How do you design a set of policies that meets the needs of a firm living in a hybrid storage world?
 
10:45 AM 15-Minute Break
 
11:00 AM Salon V-VI Deep Dive into Policies and Procedures (Part 3)
How can we make policies dynamic enough so they remain applicable as laws change, new client requirements emerge and new areas of law are practiced?
 
12:00 PM Salon V Foyer Networking Lunch
 
1:00 PM Salon V-VI New Considerations in Risk Management (Part 1)
What does the legal operations risk management life-cycle look like in 2018?
 
1:45 PM Salon V-VI New Considerations in Risk Management (Part 2)
What does a DR plan for a legal operation contain?
 
2:30 PM 15-Minute Break
 
2:45 PM Salon V-VI New Considerations in Risk Management (Part 3)
What does a BC plan for a legal operation contain?
 
3:30 PM Salon V-VI New Considerations in Risk Management (Part 4)
How do we objectively test and verify that the plans are working?
 
4:15 PM Salon V-VI Wrap-Up
Scott Rolf
 
4:30 PM Salon V Foyer Networking Reception
 
Summit Day 1: June 12
 
8:00 AM Arlington Reg Desk Registration Open
 
8:00 AM Salon III-IV Breakfast and Networking
 
9:00 AM Salon I-II General Session
 
10:15 AM Exhibit Hall Break
 
11:00 AM
Senior Management Large Firm

Salon I
Vendor Risk Management with Cloud Hosted Solutions
 

Dedicated Security Professionals

Salon II
Practical Threat Automation
 

IT Leaders with Modest Resources

Salon V
The Best Security Tool ROI – Security Awareness
 

General Track

Salon VI
InfoSEC Policies – What’s Critical & What’s New?
 
12:00 PM Networking Lunch in the Exhibit Hall
 
1:15 PM
Senior Management Large Firm

Salon I
Building a Balanced Team – IT/Security/IG
 

Dedicated Security Professionals

Salon II
Ten High Impact Rules for your SIEM
 

IT Leaders with Modest Resources

Salon V
You Too May Have GDPR Issues
 

General Track

Salon VI
Anatomy of a Data Breach
(Application for approval for this course is pending with the Virginia and New York Continuing Legal Education Boards)
 
2:15 PM Exhibit Hall Break
 
2:45 PM
Senior Management Large Firm

Salon I
InfoSEC and IG Perspectives on GDPR
 

Dedicated Security Professionals

Salon II
Threat Hunting in a Law Firm
 

IT Leaders with Modest Resources

Salon V
Cyberinsurance – Options and Coverage
 

General Track

Salon VI
Ethical Rules of Professional Conduct for Attorneys and their Security and Technology Teams
(Application for approval for this course is pending with the Virginia and New York Continuing Legal Education Boards)
 
3:45 PM Exhibit Hall Break
 
4:15 PM
Senior Management Large Firm

Salon I
Roundtable – Senior Management in Large Firms
 

Dedicated Security Professionals

Salon II
Roundtable – Dedicated Security Professionals
 

IT Leaders with Modest Resources

Salon V
Roundtable – IT Leaders with Modest Resources
 

General Track

Salon VI
Current Trends in Malware & Malware Lab
 
5:15 PM Reception in the Exhibit Hall
 
Summit Day 2: June 13
 
8:00 AM Arlington Reg Desk Registration Open
 
 
9:00 AM
Senior Management Large Firm

Salon I
Industry Metrics - Improving the External Perception of Law Firm
 

Dedicated Security Professionals

Salon II
Strategies to Deal with Data Leakage
 

IT Leaders with Modest Resources

Salon V
Five Things You Can Do Tomorrow to Enhance Your Security
 

General Track

Salon VI
Use Threat Intelligence and Threat Analytics in Security Models
 
10:00 AM Exhibit Hall Break
 
10:30 AM
Senior Management Large Firm

Salon I
Strategic IG Approach to Data Security
 

Dedicated Security Professionals

Salon II
Deep Dive into Incident Response
 

IT Leaders with Modest Resources

Salon V
Watch a 15-Year Old Build and Use a Hacking Rig
 

General Track

Salon VI
Data Hygiene for Incoming and Outgoing Data
 
11:30 AM Networking Lunch in the Exhibit Hall
 
1:00 PM
Senior Management Large Firm

Salon I
Security Risks Around Maintaining DataR
 

Dedicated Security Professionals

Salon II
Red Team Tools for the Blue Team
 

IT Leaders with Modest Resources

Salon V
Realizing the Top 5 of the CIS Top 20 Controls
 

General Track

Salon VI
Leadership in Security – Women Who Lead
 
2:00 PM Exhibit Hall Break
 
2:30 PM
Senior Management Large Firm

Salon I
Roundtable for Information Governance
 

Dedicated Security Professionals

Salon II
Ask the Expert and Sharing Takeaways – Dedicated Security Professionals
 

IT Leaders with Modest Resources

Salon V
Sharing Takeaways – IT Leaders with Modest Resources
 

General Track

Salon VI
Techniques for Securing Offsite Locations