Responding to Known Cyber Vulnerabilities, Log4j, and Others: Legal risk mitigation and ethical implications presented by technology

Nicholas R. Merker
Stephen E. Reynolds
Brian J. Pezzillo
Nicholas R. Merker | Baker & McKenzie
Stephen E. Reynolds | Baker & McKenzie
Brian J. Pezzillo | Howard & Howard Attorneys, PLLC

Live Video-Broadcast: June 2, 2022

Responding to Known Cyber Vulnerabilities, Log4j, and Others: Legal risk mitigation and ethical implications presented by technology
Accrediation Provided by:
myLawCLE
MCLE Credit Information:

Select Your State Below to View CLE Credit Information

Unable to Attend Live Broadcast?

Receive access to recorded class and earn self-study credit. Recording is made available 5 business days after live broadcast.

Can't Decide Which CLE Progam?

Access All
Federal Bar CLE Programs
co-sponsored with myLawCLE
Only $245yr

Annual Subscription includes access to:
  • 500+ Live CLE Webinars
  • National Hot Legal Topics
  • New Laws and Regulations
  • State Specific Programs
  • All Formats: Live, Replay, & On-Demand
Subscribe Today
Training 5 or more people?

Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs

Program Summary

Session l - Privacy, Cyber & Data Strategy Advisory, The Log4j Vulnerability: What this critical vulnerability means for your enterprise | Nicholas R. Merker and Stephen E. Reynolds

Attendees in this session will learn how threat actors are leveraging zero-day vulnerabilities to gain access to company resources for data exfiltration, ransomware, and other types of attacks. The panel will discuss legal implications arising from failure to respond swiftly to mitigating these vulnerabilities when they are released and how threat actors are still leveraging unpatched vulnerabilities through wide-breadth Internet scanning.

Key topics to be discussed:

  • Threat actor tactics to exploit zero-day vulnerabilities from real-world examples
  • Regulatory scrutiny due to poor reaction to mitigation efforts
  • Information sharing opportunities to react to these vulnerabilities as swiftly as possible
  • Practical thoughts on legal risk mitigation techniques

Session ll - Technology Competence: Ethical implications presented by technology | Brian J. Pezzillo

This program will discuss top technology risks faced by law firms in the practice of representing clients across broad practice areas. Issues related to evolving ethical obligations governing lawyers’ use of electronic devices in both communicating with client as well as running law offices will be discussed, including addressing issues related to confidentiality, preservation, retention and destruction of data and proper ways of disposing of outdated devices.

This program will benefit attorneys of all levels as well as paralegals and other support staff who are involved in legal research, client communication and collection and protection of confidential client information. The topics discussed will have broad applicability to a variety of practice areas. Additionally, information will be provided regarding the duties of attorneys to supervise the conduct of others in the practice of law.

Key topics to be discussed:

  • Discuss supervisory duties of attorneys
  • Identify changing rules of conduct governing the use of technology
  • Learn how to safely dispose of data and outdated devices
  • Identify key technology risks regularly encountered by attorneys and their staff

This course is co-sponsored with myLawCLE.

Date / Time: June 2, 2022

  • 2:00 pm – 4:10 pm Eastern
  • 1:00 pm – 3:10 pm Central
  • 12:00 pm – 2:10 pm Mountain
  • 11:00 am – 1:10 pm Pacific

Choose a format:

Live Video Broadcast/Re-Broadcast: Watch the Program "live" in real-time, must sign-in and watch the program on the date and time set above. May ask questions during presentation via chat box. Qualifies for "live" CLE credit.

On-Demand Video: Access CLE 24/7 via the on-demand library and watch the program anytime. Qualifies for self-study CLE credit. On-demand versions are made available 5 business days after the original recording date and are viewable for up to one year.

Closed-captioning available

Speakers

Nicholas-R.-Merker_Baker-&-McKenzie-LLP_myLawCLENicholas R. Merker | Baker & McKenzie LLP

Nicholas (“Nick”) Merker is a member of Baker McKenzie’s North America Intellectual Property & Technology Practice, which provides clients with a full suite of data privacy and cyber services. Having a ten-year background in technology as a systems, network and security engineer prior to his law career, Nick advises clients on identifying and mitigating legal risk, offering practical solutions rooted in deep understanding of the technology and new media. He is a sought-after international speaker, teacher, writer and professor on data security and privacy-related legal issues. Nick is Faculty at the International Association of Privacy Professionals where he leads global privacy trainings to executives, engineers, lawyers, and managers. He also teaches a Data Security and Privacy Law course at Indiana University Robert H. McKinney School of Law.

 

Stephen E. Reynolds_Baker & McKenzie LLP_myLawCLEStephen E. Reynolds | Baker & McKenzie LLP

Stephen Reynolds is a member of Baker McKenzie’s North America Intellectual Property & Technology Practice, which provides clients with a full suite of data privacy and cyber services. He frequently advises clients on complex matters involving data privacy and security laws and serves on the board of directors of the International Association of Privacy Professionals (IAPP). Stephen’s expertise adds value to organizations by mitigating cyber threats through proactive preventative measures and navigating complex litigation on behalf of clients in data privacy and security. As a former computer programmer and IT analyst, Stephen is uniquely able to and routinely uses his computer background in cases involving data privacy and security, electronic discovery, social media discovery, and computer forensics. Stephen has given several presentations on data privacy and security, electronic discovery, and social media discovery, and is a Certified Information Privacy Professional (CIPP/US). In addition to being a Certified Information Systems Security Professional (CISSP), Stephen teaches CISSP classes as a Direct Instructor with the (ISC) . Additionally, Stephen teaches a course on Data Security and Privacy Law at Indiana University Robert H. McKinney School of Law.

 

Brian-J.-Pezzillo_Howard-&-Howard-Attorneys,-PLLC_myLawCLEBrian J. Pezzillo | Howard & Howard Attorneys, PLLC

Brian Pezzillo is a member of Howard & Howard Attorneys, PLLC, where he practices in the areas of construction law, privacy and cybersecurity, administrative law, commercial and business law. Mr. Pezzillo advises clients with regard to data privacy compliance on international, national, and state laws including the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), California Privacy Rights Act (CPRA) and the Virginia Consumer Data Protection Act (VCDPA). Mr. Pezzillo regularly prepares privacy policies for clients and assists with development of internal privacy programs. Mr. Pezzillo earned his B.B.A. degree from the University of New Mexico, Albuquerque and his J.D. degree from the University of New Mexico School of Law in Albuquerque, New Mexico and a Graduate Certificate in Privacy and Cybersecurity from Drexel University. He is admitted to practice in New Mexico, Nevada, North Dakota (inactive), Arizona, Colorado and before the U.S. District Court, districts of Nevada and New Mexico; and U.S. Court of Appeals, 9th, and 11th circuits. Mr. Pezzillo is a member of State Bar of Nevada (Construction Law Section), as well as the State Bars of Arizona, Colorado, New Mexico, and the American Bar Association (Construction Industry Forum, Alternative Dispute Resolution Group, and Business Law Section) and Clark County Bar Association. Mr. Pezzillo serves as an arbitrator and mediator on the American Arbitration Association’s Construction and Large-Complex Construction panels as well as the Commercial and Consumer panels. He is also accredited by the International Association of Privacy Professionals (IAPP) as a Certified Information Privacy Professional/Europe (CIPP/E) and a Certified Information Privacy Manager (CIPM). He is also a Fellow of the Construction Lawyers Society of America (CLSA) and is listed as a Mountain States Super Lawyer, Best Lawyer in America and holds an AV rating from Martindale Hubbell.

Website: www.howardandhoward.com
LinkedIn: www.linkedin.com/in/brian-pezzillo-cipp-e-cipm-23a6b13

Agenda

Session l – Privacy, Cyber & Data Strategy Advisory, The Log4j Vulnerability: What this critical vulnerability means for your enterprise | 2:00 pm – 3:00 pm

I. Threat actor tactics to exploit zero-day vulnerabilities from real-world examples | 2:00 pm – 2:15 pm
II. Regulatory scrutiny due to poor reaction to mitigation efforts | 2:15 pm – 2:30 pm
III. Information sharing opportunities to react to these vulnerabilities as swiftly as possible | 2:30 pm – 2:45 pm
IV. Practical thoughts on legal risk mitigation techniques | 2:45 pm – 3:00 pm

Break | 3:00 pm – 3:10 pm

Session ll – Technology Competence: Ethical implications presented by technology | 3:10pm – 4:10 pm

V. Discuss supervisory duties of attorneys | 3:10 pm – 3:25 pm
VI. Identify changing rules of conduct governing the use of technology | 3:25 pm – 3:40 pm
VII. Learn how to safely dispose of data and outdated devices | 3:40 pm – 3:55 pm
VIII. Identify key technology risks regularly encountered by attorneys and their staff | 3:55 pm -4:10 pm