Security Vulnerabilities and Ransomware Shutdowns: Learning from Apache Log4j vulnerability and the associated legal duties and ethical implications presented by technology

Kristin H. Hardy
Zachary Heck
Brian J. Pezzillo
Kristin H. Hardy | Taft Stettinius & Hollister LLP
Zachary Heck | Taft Stettinius & Hollister LLP
Brian J. Pezzillo | Howard & Howard Attorneys, PLLC
Live Video-Broadcast: August 25, 2022
Security Vulnerabilities and Ransomware Shutdowns: Learning from Apache Log4j vulnerability and the associated legal duties and ethical implications presented by technology

$195.00 2 hour CLE

MCLE Credit Information:

Select Your State Below to View CLE Credit Information

Can't Decide Which CLE Progam?

Access All
myLawCLE Programs
Only $395yr

Annual Subscription includes access to:
  • 500+ Live CLE Webinars
  • National Hot Legal Topics
  • New Laws and Regulations
  • State Specific Programs
  • All Formats: Live, Replay, & On-Demand
Subscribe Today
Training 5 or more people?

Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs

Program Summary

Session l - Security Vulnerabilities and Ransomware Shutdowns: Learning from Apache Log4j Vulnerability and the Associated Legal Dutie - Kristine Hardy and Zachary Heck

Vulnerabilities exposed by Apache Log4j are affecting companies of all sizes and industries. In response to this event, this presentation will highlight the associated legal duties learned from the Apache Log4j Vulnerability and how to be proactive in protecting your data. This presentation will also cover legal risks that ransomware poses to organizations, the realities of ransomware shutdowns, and how to plan for and mitigate ransomware attacks, among other security threats.

Key topics to be discussed:

  • Associated legal duties learned from the Apache Log4j Vulnerability Regulatory scrutiny due to poor reaction to mitigation efforts
  • How to be proactive in protecting your data
  • Legal risks that ransomware poses to organizations, ransomware shutdowns, and how to plan and mitigate ransomware attacks

Session ll - Technology Competence: Ethical implications presented by technology - Brian J. Pezzillo

This program will discuss top technology risks faced by law firms in the practice of representing clients across broad practice areas. Issues related to evolving ethical obligations governing lawyers’ use of electronic devices in both communicating with client as well as running law offices will be discussed, including addressing issues related to confidentiality, preservation, retention and destruction of data and proper ways of disposing of outdated devices.

This program will benefit attorneys of all levels as well as paralegals and other support staff who are involved in legal research, client communication and collection and protection of confidential client information. The topics discussed will have broad applicability to a variety of practice areas. Additionally, information will be provided regarding the duties of attorneys to supervise the conduct of others in the practice of law.

Key topics to be discussed:

  • Discuss supervisory duties of attorneys
  • Identify changing rules of conduct governing the use of technology
  • Learn how to safely dispose of data and outdated devices
  • Identify key technology risks regularly encountered by attorneys and their staff

Date / Time: August 25, 2022

  • 2:00 pm – 4:10 pm Eastern
  • 1:00 pm – 3:10 pm Central
  • 12:00 pm – 2:10 pm Mountain
  • 11:00 am – 1:10 pm Pacific

 

Closed-captioning available

Speakers

Kristin-H.-Hardy_Taft-Stettinius-&-Hollister-LLP_myLawCLEKristin H. Hardy | Taft Stettinius & Hollister LLP

Kristin Hardy’s practice focuses primarily on trademark, copyright, and domain name, in addition to various privacy and data security matters. Kristin regularly assists clients in protecting their brands, creative works, and proprietary information, as well as helping clients commercialize intellectual property through licensing and other transactional agreements. She provides guidance to clients regarding brand development, clearance, registration, maintenance, and strategy for national and international trademark portfolios, in addition to assisting clients regarding trademark and copyright infringement and enforcement issues including preparing and responding to cease and desist letters, representing and defending clients before the U.S. Trademark Trial and Appeal Board, and negotiating consent-to-use and co-existence agreements.

 

Zachary-Heck_Taft-Stettinius-&-Hollister-LLP_myLawCLEZachary Heck | Taft Stettinius & Hollister LLP

Zachary Heck’s practice focuses on privacy and data security. He speaks and writes regularly on cutting-edge data privacy and cybersecurity issues and is a Certified Information Privacy Professional in the fields of United States and European Union laws and regulations. Zach assists clients in the areas of privacy compliance, defense litigation, class action defense and guidance in the aftermath of an information security event, including data breach. Zach has experience advising clients with respect to FTC investigations, federal privacy regulations such as HIPAA, FCRA, TCPA and GLBA, as well as state laws governing personally identifiable information.

 

Brian-J.-Pezzillo_Howard-&-Howard-Attorneys-PLLC_myLawCLEBrian J. Pezzillo | Howard & Howard Attorneys, PLLC

Brian Pezzillo is a member of Howard & Howard Attorneys, PLLC, where he practices in the areas of construction law, privacy and cybersecurity, administrative law, commercial and business law. Mr. Pezzillo advises clients with regard to data privacy compliance on international, national, and state laws including the General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), California Privacy Rights Act (CPRA) and the Virginia Consumer Data Protection Act (VCDPA).

Mr. Pezzillo regularly prepares privacy policies for clients and assists with development of internal privacy programs. Mr. Pezzillo earned his B.B.A. degree from the University of New Mexico, Albuquerque and his J.D. degree from the University of New Mexico School of Law in Albuquerque, New Mexico and a Graduate Certificate in Privacy and Cybersecurity from Drexel University. He is admitted to practice in New Mexico, Nevada, North Dakota (inactive), Arizona, Colorado and before the U.S. District Court, districts of Nevada and New Mexico; and U.S. Court of Appeals, 9th, and 11th circuits. Mr. Pezzillo is a member of State Bar of Nevada (Construction Law Section), as well as the State Bars of Arizona, Colorado, New Mexico, and the American Bar Association (Construction Industry Forum, Alternative Dispute Resolution Group, and Business Law Section) and Clark County Bar Association.

Mr. Pezzillo serves as an arbitrator and mediator on the American Arbitration Association’s Construction and Large-Complex Construction panels as well as the Commercial and Consumer panels. He is also accredited by the International Association of Privacy Professionals (IAPP) as a Certified Information Privacy Professional/Europe (CIPP/E) and a Certified Information Privacy Manager (CIPM). He is also a Fellow of the Construction Lawyers Society of America (CLSA) and is listed as a Mountain States Super Lawyer, Best Lawyer in America and holds an AV rating from Martindale Hubbell.

Website: www.howardandhoward.com
LinkedIn: www.linkedin.com/in/brian-pezzillo-cipp-e-cipm-23a6b13

Agenda

Session l – Security Vulnerabilities and Ransomware Shutdowns: Learning from Apache Log4j vulnerability and the associated legal duties | 2:00pm – 3:00pm

  1. Associated legal duties learned from the Apache Log4j vulnerability regulatory scrutiny due to poor reaction to mitigation efforts | 2:00pm – 2:20pm
  2. How to be proactive in protecting your data | 2:20pm – 2:40pm
  3. Legal risks that ransomware poses to organizations, ransomware shutdowns, and how to plan and mitigate ransomware attacks | 2:40pm – 3:00pm

Break | 3:00pm –3:10pm

Session ll – Technology Competence: Ethical implications presented by technology | 3:10pm – 4:10pm

  1. Discuss supervisory duties of attorneys | 3:10pm – 3:25pm
  2. Identify changing rules of conduct governing the use of technology | 3:25pm – 3:40pm
  3. Learn how to safely dispose of data and outdated devices | 3:40pm – 3:55pm
  4. Identify key technology risks regularly encountered by attorneys and their staff | 3:55pm – 4:10pm