A flurry of legislative and legal activity is re-shaping the way privacy and cybersecurity professionals conduct business. As a result, in addition to actually carrying out their protection responsibilities, professionals charged with protecting private and confidential data must be also be constantly aware of these evolving regulatory and legal obligations.
Visit https://www.securityweekly.com/scw for all the latest episodes!
Hot Legal Topics in Privacy and Cybersecurity, Part 2
Erik Weinick – Partner at Otterbourg PC
Erik B. Weinick is a graduate of Cornell University and Cornell Law School, and is a co-founder of the Privacy & Cybersecurity Practice at Otterbourg P.C., a Manhattan-based law firm, where he is a partner. In addition to his work on privacy and cybersecurity matters, Erik is a member of Otterbourg’s bankruptcy and litigation departments. Admitted to practice in both New York and Florida, Erik has represented a wide array of commercial and financial firms, entrepreneurs, individuals, as well as domestic and foreign governmental agencies, before regulators, state and federal courts, and alternative dispute resolution tribunals. He is a certified CIPP-US privacy professional, a member of the Advisory Board of Agnes Intelligence, Inc., an artificial intelligence technology firm, and is a prolific writer and speaker on issues relating to privacy and cybersecurity.
Jeff Man – #HackingisNotaCrime Advocate, Sr. InfoSec Consultant at Online Business Systems
Cryptanalyst, infosec analyst, pioneering ex-NSA pen tester, PCI specialist and certified security curmudgeon. Currently a Sr. InfoSec Consultant for Online Business Systems.
Josh Marpet – COO at Red Lion
COO of Red Lion
Priya Chaudhry – Jedi Warrior Princess at ChaudhryLaw PLLC
Criminal Defense Trial Lawyer
Scott Lyons – CEO at Red Lion
CEO at Red Lion
Do you have a specific guest or topic that you want us to cover on one of the shows? Submit your suggestions for guests by visiting https://securityweekly.com/guests and completing the form! We review suggestions monthly and will reach out to you once reviewed!
In our next technical training webcast on May 13th at 11am ET, see how attackers gain access to endpoints, and learn how to use defensive strategies to protect against those attacks! In our May 27th webcast at 11am ET, we’ll explore the latest attacks against DNS and the latest techniques that make it possible to discover and disrupt attacks. Then join our webcast on June 3 to learn about pen testing tools and why every organization should be using them regularly. Visit https://securityweekly.com/webcasts to register now! If you missed any of our previously recorded webcasts or technical trainings, they are available for your viewing pleasure at https://securityweekly.com/ondemand