Over the past couple of months, both national and international government agencies have provided alerts on the rise of exploitation by cybercriminals, including the deployment of ransomware. Attorneys have a professional responsibility to be competent with technology, as well as safeguard confidential and protected information. The purpose of this presentation has two main facets: (1) a tech industry prospective what a ransomware attack does, as well as ways to prevent it; and (2) a lawyer’s perspective on the legal ramifications of prevention, detection, and correction, as well as personal experience in representing clients.
Key topics to be discussed:
Anatomy of a ransomware attack
Available technology to assist in mitigating a successful deployment
Laws and compliance
Case law and responding to government agencies
Choose a format:
Live Video Broadcast/Re-Broadcast: Watch Program "live" in real-time, must sign-in and watch program on date and time set above. May ask questions during presentation via chat box. Qualifies for "live" CLE credit.
On-Demand Video: Access CLE 24/7 via on-demand library and watch program anytime. Qualifies for self-study CLE credit. On-demand versions are made available 5 business days after the original recording date and are viewable for up to one year.
Rachel V. Rose, JD, MBA | Rachel V. Rose – Attorney at Law, P.L.L.C. (Houston, TX)
Ms. Rose has a unique background, having worked in many different facets of healthcare, securities, cybersecurity, as well as international law and business throughout her career. Her practice focuses on a variety of cybersecurity, health care and securities law issues related to industry compliance and transactional work, as well as representing plaintiffs in Dodd-Frank/False Claims Act whistleblower claims. In addition to being extensively published and a sought-after presenter and quoted expert, Ms. Rose holds an MBA with minors in healthcare and entrepreneurship from Vanderbilt University, and a law degree from Stetson University College of Law, where she graduated with various honors, including the National Scribes Award and The William F. Blews Pro Bono Service Award.
Ms. Rose is licensed in Texas and is a Fellow of the Federal Bar Association. Currently, she is the Chair of the Federal Bar Association’s Government Relations Committee, the co-editor of the American Health Lawyers Association’s Enterprise Risk Management Handbook for Healthcare Entities (2nd Edition), as well as a co-author of the books The ABCs of ACOs and What Are International HIPAA Considerations? She has been named consecutively to the Texas Bar College, the National Women Trial Lawyers Association’s Top 25 and Houstonia Magazine’s Top Lawyers for healthcare. In 2019, she was also named to the National Trial Lawyers Association’s Top 100, as well as 1st Healthcare Compliance’s 2019 Top Presenter. Ms. Rose is also an Affiliated Member with the Baylor College of Medicine’s Center for Medical Ethics and Health Policy, where she teaches bioethics. See www.rvrose.com for additional information.
Federal Court Admissions: DC, SDTX, NDTX, EDTX, and WDTX.
Erich Kron | Security Awareness Advocate at KnowBe4
Erich Kron, Security Awareness Advocate at KnowBe4, is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the US Army’s 2nd Regional Cyber Center-Western Hemisphere, and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. Erich has worked with information security professionals around the world to provide the tools, training, and educational opportunities to succeed in Information Security.
I. Overview of the presentation | 2:00-2:05
II. Overview of ransomware, when it started and latest trends | 2:05-2:15
III. How ransomware is being spread in the world | 2:15-2:25
IV. Ransomware gangs, profit sharing and monetizing the attacks | 2:25-2:35
V. Defending against the attacks using low and high tech methods | 2:35-2:55
VI. Overview of cybersecurity laws2:55-3:05
VII. Break | 3:05-3:15
VIII. What is an adequate risk analysis/risk assessment | 3:15-3:25
IX. Potential liability after a ransomware attack | 3:25-3:35
X. Receiving a notice from a government agency about a potential breach – what do I do now? | 3:35-3:45
XI. Low-hanging fruit and potential response options | 3:45-3:55
XII. Risk Mitigation and Compliance | 3:55-4:00
XIII. Thank you and Questions | 4:00-4:10