© Copyright 2019 Drexel University Online. All Rights Reserved. Privacy Policy.

PRESENTED BY

RSVP TODAY
For more information, contact Patricia Bush-McManus at 215.895.0951 or pgb36@drexel.edu
DIRECTIONS
Thursday, April 12 | 9 a.m. - 5 p.m. ET
Kaiser Permanente Center for Total Health
 700 2nd Street NE
 Washington, DC

(Near Union Station)

Free to Attend
Breakfast and Lunch Included

Join Drexel University to explore the intersection of cybersecurity, compliance, data privacy, and technology in today’s ever-evolving digital ecosystem

Planning for future success in the digital space requires an in-depth understanding of past and present issues faced by institutions across the globe. Attendees will gain insight into potential solutions for dealing with complex and demanding domestic and international regulations. The event will feature discussions and keynote luncheon with speakers representing a variety of fields, including law, business, technology, and compliance.

Parking
There are several nearby public garages, including directly across the street at 701 2nd Street NE and at Union Station

KEYNOTE PRESENTATION

Russian Cyber Capabilities: The Real Story Behind the Hype

Ambassador David J. Smith
 Professor of Cybersecurity Policy, Utica College
 Principal at Cyberlight Global Associates, LLC
 Director of the Georgian Security Analysis Center in Tbilisi, Georgia 

Khatuna Mshvidobadze, PhD
 Adjunct Professor of Cybersecurity, Utica College
 Principal at Cyberlight Global Associates, LLC
 Senior Fellow at the Georgian Foundation for Strategic and International Studies 

Whether you are trying to protect your clients’ information, to conduct a free and fair election, or just safeguarding your credit card account, chances are that someone is out to thwart you. Hackers are not only tolerated in Russia, they are applauded and even hired by the Russian state. Our speakers will unwrap the Russian cyber mystery, discussing Russian cyber capabilities and breaking world events, placing the Russian cyber threat in the broader context of information warfare.

SESSION 1

Compliance in a Global Economy: Balancing Conflicting Requirements in a Cross-Border World

Principles of data privacy, cybersecurity, technology, and compliance converge when organizations exchange, transfer, and process sensitive information. Striking the balance between data privacy and cybersecurity with business and litigation demands becomes increasingly complex in cross-border data exchanges with heightened international regulations. This panel will explore this intersection of domestic and international data obligations and its effect on secure data management practices.

Paul Flanagan, JD
 Associate Professor, Thomas R. Kline School of Law, Drexel University

Jordan Fischer, Esq
 Adjunct Professor, Thomas R. Kline School of Law, Drexel University
 Managing Partner, XPAN Law Group, LLC

Aaron Gardner
 Vice President, Enterprise Solutions, KLDiscovery

Robert Kay
 Chief Compliance Officer, American Academic Health System

William Mendez
 Director, Friedman CyZen, LLC

SESSION 2

Cyber Crime Never Sleeps: How to Cope with the “Invisible Man”

Twenty-four hours a day, seven days a week cybercriminals are trying to gain access to the systems and steal identities – and these criminal enterprises are only growing in prominence. The criminals are getting smarter and more sophisticated, backed by individual criminal groups or nation-state actors exploiting vulnerabilities in both the public and private sectors and gaining valuable information, including intellectual property and sensitive data. The speaker will explore the growing need for private and public sector communications and collaboration to decrease vulnerabilities and to continue to protect against attacks.

Marcus H. Sachs
 Operating Partner, RIDGE-LANE Limited Partners

SESSION 3

Two Factor Authentication (2FA) Deep Dive: Choose the Right Solution for Your Users

With a steady cadence of massive data breaches making front page news, cybersecurity is more present in the public conversation now than ever before. Experts consistently encourage companies looking to secure their users’ accounts to implement two factor authentication (2FA), if they haven’t already, and for end users to enable it. The speaker will dive into the details of the most common 2FA implementations, highlight the security benefits and drawbacks of each, and equip attendees with enough knowledge to inform their internal evaluation of which 2FA solution is best for their users.

Conor Gilsenan
 Founder, Two-Factor Buddy
 Editor-in-Chief, All Things Auth


SESSION 4

The Business of Cybersecurity and Data Privacy: Facilitating the Communication between Technology, Business, and Law

In the past, businesses have siloed operations, law, compliance, and technology, viewing these areas as separate sectors within a company. With the growing prominence of cybersecurity, and the need for businesses to create comprehensive, enterprise-wide solutions, the barrier between these sectors needs to be broken down. This panel will highlight how to create a cohesive, strong approach to cybersecurity by developing collaboration and communication between operations, law, compliance, and technology.

Jordan Fischer, Esq
 Adjunct Professor, Thomas R. Kline School of Law, Drexel University
 Managing Partner, XPAN Law Group, LLC

Rebecca Rakoski, Esq
 Managing Partner, XPAN Law Group, LLC

Christine Vanderpool
 Deputy Chief Information Security Officer and
 Executive Director, Cyber Risk, Kaiser Permanente

Steven Weber, PhD
 Professor and Interim Department Head, College of Engineering, Drexel University
 Director, Isaac L. Auerbach Cybersecurity Institute

SESSION 3

Two Factor Authentication (2FA) Deep Dive: Choose the Right Solution for Your Users

With a steady cadence of massive data breaches making front page news, cybersecurity is more present in the public conversation now than ever before. Experts consistently encourage companies looking to secure their users’ accounts to implement two factor authentication (2FA), if they haven’t already, and for end users to enable it. The speaker will dive into the details of the most common 2FA implementations, highlight the security benefits and drawbacks of each, and equip attendees with enough knowledge to inform their internal evaluation of which 2FA solution is best for their users.

Conor Gilsenan
 Founder, Two-Factor Buddy
 Editor-in-Chief, All Things Auth


SESSION 4

The Business of Cybersecurity and Data Privacy: Facilitating the Communication between Technology, Business, and Law

In the past, businesses have siloed operations, law, compliance, and technology, viewing these areas as separate sectors within a company. With the growing prominence of cybersecurity, and the need for businesses to create comprehensive, enterprise-wide solutions, the barrier between these sectors needs to be broken down. This panel will highlight how to create a cohesive, strong approach to cybersecurity by developing collaboration and communication between operations, law, compliance, and technology.

Jordan Fischer, Esq
 Adjunct Professor, Thomas R. Kline School of Law, Drexel University
 Managing Partner, XPAN Law Group, LLC

Rebecca Rakoski, Esq
 Managing Partner, XPAN Law Group, LLC

Christine Vanderpool
 Deputy Chief Information Security Officer and
 Executive Director, Cyber Security, Technology Risk Office, Kaiser Permanente

Steven Weber, PhD
 Professor, Interim Department Head, College of Engineering, Drexel University
 Director, Isaac L. Auerbach Cybersecurity Institute, College of Engineering, Drexel University