“Bad Practices” and “Cyber Blunders”: How to decrease knowable and preventable cyber mistakes

Kathryn M. Rattigan
Kathryn M. Rattigan | Robinson & Cole

Kathryn Rattigan is a member of the firm's Business Litigation Group and Data Privacy + Cybersecurity Team. She advises clients on data privacy and security, cybersecurity, and compliance with related state and federal laws. Kathryn also provides legal advice regarding the use of unmanned aerial systems (UAS, or drones) and Federal Aviation Administration (FAA) regulations.

On-Demand: October 11, 2021

“Bad Practices” and “Cyber Blunders”: How to decrease knowable and preventable cyber mistakes
MCLE Credit Information:

Select Your State Below to View CLE Credit Information

Unable to Attend Live Broadcast?

Receive access to recorded class and earn self-study credit. Recording is made available 5 business days after live broadcast.

Can't Decide Which CLE Progam?

Access All
myLawCLE Programs
Only $245yr

Annual Subscription includes access to:
  • 500+ Live CLE Webinars
  • National Hot Legal Topics
  • New Laws and Regulations
  • State Specific Programs
  • All Formats: Live, Replay, & On-Demand
Subscribe Today
Training 5 or more people?

Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs

Program Summary

The Cybersecurity and Infrastructure Security Agency (CISA) recently released its first of several installments to its “Bad Practices” publication. CISA’s goal: to develop a catalog of Bad Practices, especially for organizations that support Critical Infrastructure (CI) and National Critical Functions (NCF), in hopes of decreasing some of these foreseeable cyber mistakes. CISA is the risk advisor to the United States, working with partners to defend against cyber threats and collaborating to build a more secure and resilient infrastructure.

The threats that the country’s CI and NCFs face are complex and the threat actors diverse and plentiful. During this session, we will discuss what threats our CI, NCFs and the data they maintain and transmit face, what some of the most common cyber blunders and mistakes are, and how to protect against those threats and mistakes.

This course is co-sponsored with myLawCLE.

Key topics to be discussed:

  • Cyberattacks against CI can have a significant impact on critical functions of our government and private sector.
  • What ‘bad practices’ and ‘blunders’ are still occurring in CI/NCFs and why?
  • How can government and private sector protect our CI and data stored and transmitted within that infrastructure?

Date / Time: October 11, 2021

  • 12:00 pm – 1:00 pm Eastern
  • 11:00 am – 12:00 pm Central
  • 10:00 am – 11:00 am Mountain
  • 9:00 am – 10:00 am Pacific

Choose a format:

Live Video Broadcast/Re-Broadcast: Watch Program "live" in real-time, must sign-in and watch program on date and time set above. May ask questions during presentation via chat box. Qualifies for "live" CLE credit.

On-Demand Video: Access CLE 24/7 via on-demand library and watch program anytime. Qualifies for self-study CLE credit. On-demand versions are made available 5 business days after the original recording date and are viewable for up to one year.

Closed-captioning available

Speakers

Kathryn M. Rattigan Robinson & Cole_myLawCLEKathryn M. Rattigan | Robinson & Cole

Kathryn Rattigan is a member of the firm’s Business Litigation Group and Data Privacy + Cybersecurity Team. She advises clients on data privacy and security, cybersecurity, and compliance with related state and federal laws. Kathryn also provides legal advice regarding the use of unmanned aerial systems (UAS, or drones) and Federal Aviation Administration (FAA) regulations. She represents clients across all industries, such as insurance, health care, education, energy, and construction.

Agenda

I. Identifying and Protecting High-Risk Data in CI and NCFs | 12:00-12:08
II. Cyber Risks to CI and NCFs | 12:08-12:16
III. Recent Risks and Threats and Related Costs | 12:16-12:25
IV. In the News -Recent Attacks | 12:25-12:33
V. Common Cyber Blunders and Mistakes | 12:33-12:41
VI. Tips for Protecting and Securing CI and NCFs | 12:41-12:50
VII. Conclusion and Questions | 12:50-1:00