Events

Cyber Attack Simulation Event - Denver

Events / Thursday, Oct. 27, 2016
12:30 – 4 p.m. Attack simulation | 4 – 5 p.m. Cocktail reception

University of Denver
Engineering & Computer Science Building
2155 E. Wesley Ave.
Room 510
Denver, CO 80208

Cybersecurity threats continue to be among the most pressing issues today. Companies must proactively take steps to protect themselves against the risks arising from the compromise of personal data, loss of critical business systems, and theft of intellectual property and other proprietary information.

Please join us on Thursday, October 27 for a Cyber Attack Simulation where experts from FireEye, BakerHostetler and the FBI will share best practices and help you prepare for a potential cyber breach.

During this event, we will walk through a mock incident and discuss legal and technical challenges that arise when responding to a cyber security incident. Also, we will discuss important topics such as legal disclosures, cyber insurance, incident response plans, communications and working with law enforcement.

Our panelists will include:
  • Ted Kobus, BakerHostetler Privacy and Data Protection National Leader
  • FBI Special Agent (to be announced)
  • Eric Scales, Mandiant Incident Response Director
  • Robb Reck, Ping Identity CISO

We look forward to you joining us for what is certain to be an informative and action-packed afternoon.

Space is limited. Please reserve your seat today.

For questions, please contact Courtney Litman at 215.564.2771.

Register now >>

Event Details

DATE

Thursday, Oct. 27, 2016

TIME

12:30 – 4 p.m. - Attack simulation

4 – 5 p.m. - Cocktail reception

VENUE

University of Denver
Engineering & Computer Science Building
2155 E. Wesley Ave.
Room 510
Denver, CO 80208

Related Services

Blog

In The Blogs

Previous Next
Data Privacy Monitor
Clearly Defined HIPAA and FERPA Policies May Help Covered Entities in Defending a Claim for Unemployment Compensation
By Paulette M. Thomas
February 19, 2019
Recently, in Dantry v. Unemployment Compensation Board of Review, No. 1665 C.D. 2017 (Pa. Cmwlth. 2019), the Commonwealth Court of Pennsylvania reversed the order of the Unemployment Compensation Board of Review (Board) which had affirmed...
Read More ->
Data Privacy Monitor
Best Cybersecurity Practices for Healthcare Organizations – Loss or Theft of Devices
By Kathryn Carey, Aleksandra Vold
February 18, 2019
This article is part of a series of blog posts exploring the recommendations and guidance Health & Human Services (HHS) provides to healthcare organizations in its Cybersecurity Best Practices report. For previous articles in the series...
Read More ->
Data Privacy Monitor
Best Cybersecurity Practices for Healthcare Organizations – Ransomware Prevention
By Kathryn Carey, Aleksandra Vold
February 8, 2019
This article is part of a series of blog posts exploring the recommendations and guidance Health & Human Services (HHS) provides to healthcare organizations in its “Cybersecurity Best Practices” report. For previous articles in the series...
Read More ->
Data Privacy Monitor
Insurance Data Security Model Law Picks Up Steam
By Andreas T. Kaltsounis, Shea M. Leitch
February 6, 2019
Three states recently enacted variations of the National Association of Insurance Commissioner’s (NAIC) Insurance Data Security Model Law (MDL-668), based on the landmark cybersecurity requirements issued by the New York Department of...
Read More ->
Data Privacy Monitor
What Can We Learn From the Healthcare Data Breach ‘Wall of Shame'?
By Eric A. Packel
February 4, 2019
In addition to dealing with the public outcry and regulatory scrutiny resulting from a healthcare data breach, covered entities under the Health Insurance Portability and Accountability Act (or their business associates) are required to...
Read More ->