Roy E. Hadley, Jr. Overview. Partner. Contact Information. Education.
|
|
- Adele Simon
- 5 years ago
- Views:
Transcription
1 Roy E. Hadley, Jr. Partner Corporate Transactions & Securities International Privacy & Information Security Overview With a practice that is international in scope, Roy counsels clients worldwide on complex corporate transactions, particularly those involving technology, telecommunications, outsourcing, and intellectual property. Roy similarly assists clients with matters involving information security assessments, PCI compliance, data breach remediation, and risk mitigation. He also advises corporate boards and management teams on information security risk management. Roy was recently named one of "America s Most Influential Lawyers" for 2013 and was named a "2012 Cyber Security Visionary" by BE Engineering Magazine. Contact Information Two Alliance Center 3560 Lenox Road NE Suite 1600 Atlanta, Georgia Direct: Fax: Education University of Georgia School of Law, J.D., 1988 University of Georgia, B.B.A., 1985 Information Management. A broad range of companies rely on Roy's guidance on issues related to data security and privacy, technology and business process outsourcing, telecommunications, health information technology, electronic medical records, software development and licensing, and entertainment and new media. He routinely advises cable and entertainment networks, telecommunications companies, financial institutions, sports franchises and startups on technology compliance, website review, digital rights, convergence and technology development and licensing. He assists clients with information security and technology accessibility assessments and audits; counsels on data breach remediation, electronic records management and e-discovery; and provides compliance training. Roy counsels clients on implementing and maintaining corporate governance and compliance programs, as well as risk management and insurance, mergers, acquisitions and regulatory matters. He also has significant experience in entertainment marketing, promotions and production, including advertising review and sweepstakes. Entertainment and Media. Roy has a long history of counseling clients in the entertainment, media and sports areas. Through his previous in-house roles working with media and entertainment companies, and his experience in private practice, Roy has developed a unique skill set that allows him to understand both "new media" and traditional media and their impact on clients and their businesses. Whether working in the telecommunications arena, with cable or media companies, sports franchises, professional athletes or entertainers, Roy is able to help clients navigate the convergence of different types of media and the challenges associated with today's ever changing technological and social environments. Roy also counsels professional athletes and entertainers on contractual and business matters, with an emphasis on creating lifelong success, especially after they have ended their playing/performing careers. International. Roy's extensive experience includes advising on international corporate
2 matters such as facilitating cross-border transactions involving technology transfers, establishing distribution channels, and advising on business processes and services, information security and privacy in jurisdictions including South and Central America, Africa, Asia-Pacific and the European Union. He counsels clients on business and immigration matters, with particular emphasis on Africa companies and the African Diaspora. He also advises U.S. companies on doing business in Africa and African companies seeking to do business in the United States. Prior to private practice, Roy's business experience involved serving as: Vice president, general counsel, and corporate secretary of AirGate PCS, Inc. Vice president, corporate counsel, and chief privacy officer for WorldTravel BTI. In-house counsel for Turner Entertainment Group/AOL Time Warner and MCI WorldCom. From , Roy was special counsel to the president of the American Bar Association. He also previously served as special assistant attorney general for the state of Georgia. Roy is admitted to practice in Georgia. Experience Media Co-lead on $1 billion infrastructure and managed network services outsourcing contracts for state agency. Co-lead on $330 million purchase and corporate restructuring for large privately held media group. Directed legal team in the merger of a wireless telecommunications company with another communications company, including all legal, regulatory, compliance and human resource matters. Currently counseling athletes and entertainers on endorsements, business opportunities, social media and other contractual matters. Counseled client on convergence and interactive media technologies, content distribution and enhanced broadband/multimedia applications. Led development of intellectual property legal group concentrating on computer technology, telephony, wireless strategies, software development and licensing, and related intellectual property issues including copyright and trademark law Advised an international telecommunications company on product outsourcing, OEM manufacturing and post product assembly transactions. Represent international companies in accessing U.S. technologies, in facilitating technology transfers, and in negotiating licensing and global distribution rights. Africa Represents a large U.S. manufacturer and distributer of agricultural equipment in multiple African countries and facilitates joint ventures with local partners throughout Africa. Represents African companies in accessing U.S. technologies, in facilitating technology transfer, and in negotiating licensing and distribution rights in southern and western Africa. Assisting several U.S. companies on international trade and the establishment of distribution channels for the export of telecommunications equipment into Africa. Assisted a U.S.-based commodities trading company in establishing distribution, warehousing and trading operations of perishable commodities in Liberia and western Africa. Advised U.S. companies doing business in Southern Africa with joint venture structuring, incorporating tax incentives, foreign grant and enterprise incentives into overall project finance. Represented a South African financial advisory and investment management firm on project finance, capital markets, mergers and acquisitions. Advised a South African telecommunications company on product outsourcing, OEM
3 manufacturing and post product assembly transactions. Advised clients on solar energy projects in South Africa and Botswana. Publications Entertainment and Media "A Little Common Sense can go a Long Way with Athletes," The Miami Herald "NFL Draftees Need Economics Lesson," The Orange County Register "Another flock of NFL lambs could be headed to financial disaster in long term," Philly.com "10 Good Minutes with...roy Hadley," The Sports Page Week ly "Athletes can learn what NOT to do from Ben Roethlisberger," SanLuisObispo.com Information Management European Union Imposes Extraterritorial Privacy Obligations on U.S. Businesses, Thompson Hine Privacy & Information Security Update, May 2014 Canada s New Anti-Spam Law Is Your Business Ready?, Thompson Hine Privacy & Information Security Update, May 2014 New California Law Requires Tracking Transparency, Thompson Hine Privacy & Information Security Update, March 2014 Interviewed, Update on Cyber Security, TAG Radio, February, 2014 Quoted,"Inside 'Plan X:' The Pentagon's Plan for Cyberweapon Central," FoxNews.com, December 2012 Quoted, "Cybersecurity Legislation: We Need to Get Our Act Together, and Fast," CRN, November 2012 Quoted, "Cybersecurity Exclusive: As Cyber Threat Grows, President Ponders Executive Action," Homeland Security Today, September 2012 Quoted, "EU Could Rain on Cloud Strategy with Too-Tight Data Rules," Law360, June 2012 Quoted, "IT Forecast: Warming, with a Chance of Cloud Computing," Hospitals & Health Network s, July 2011 Author, Inside Counsel Magazine, article series (6 articles) on technology, April to July 2011 Quoted, "Oncor Brings Smart Grid to 3 Million Texans, Privacy Intact," Signal News, June 2011 Quoted, "The Dangerous Downpour of Cyber Data," Intelligent Utilities Magazine, March 2011 Quoted, "Google Offers a Wisp of Cloud Printing," TechNews World, January 2011 Quoted, "White House Considers Relaxing Cloud Security Requirements," NextGov.com, January 2011 Co-author, "The Legal Issues Are Somewhat Cloudy in the Cloud," Journal of the Georgia Bar, October 2010 Quoted, Law360, as part of an overview of employment cases to watch in 2010 and on City of Ontario et al. v. Jeff Quon a U.S. Supreme Court case regarding privacy policies for employees in the workplace, Presentations Presenter and Board Chair, Technology Associate of Georgia 2014 Cyber-Security and Business Risk Simulation and Cyber Attack and Response Exercise, February, 2014 Panelist, Growing Insecurity: The Risks of Access, Openness & Freedom, World Affairs Council, February, 2014 Presenter, Good Governance: What is it? What is it not? Thompson Hine Best of Boards Series, January, 2014 Presenter, A Survey of the Changing Laws Affecting Information Security: What Every
4 Information Security Practitioner Needs to Know, Technology Association of Georgia, November, 2013 Presenter, Doing Business in Africa: Perceptions and Realities, Kettering Executive Network Multinational Special Interest Group, July 2013 Co-Presenter, Lessons Learned: Thoughts from a Cyber Simulation, Technology Association of Georgia, May 2013 Presenter, Data Security in a Changing World," Association of Corporate Counsel, March 2013 Panelist, Technology Association of Georgia Cyber-Security and Business Risk Simulation and Cyber Attack Exercise, February, 2013 Host and Panelist, the Atlanta Chapter of The International Association of Privacy Professionals (IAPP) quarterly KnowledgeNet program. Panel discussion, "Bring Your Own Device to Work," surrounding issues of data security surrounding mobile devices in the work place, September 2012 Presenter, "Information Security and Privacy Concerns for Executives and Owners of Closely Held Businesses," client seminar, January 2012 Presenter, "Cloud Computing: Privacy and Information Security Concerns," client seminar, Dayton, Ohio, November 2011 Presenter, "Best Practices in Software Purchasing Agreements," Barnes & Thornburg/escrow associates client seminar, September 2011 Panelist, "Using Social Media in Recruiting," BW Partners Recruiting Symposium, September 2011 Presenter, "Cloud Computing: Exploring Legal Risks," SecureWorld Conference, Atlanta, May 2011 Presenter, "The Legal Risks of Cloud Computing," American Forest and Paper Association General Counsel Forum, April 2011 Presenter, "Cloud Computing: Exploring Legal and Other Risks," Fourth Annual ISACA South Florida WOW! Conference, February 2011 Co-presenter, "Advertising and Promotion: Technology and Law," Georgia Chapter of the ACC, December 2010 Presenter, "Legal Trends in Technology Asset Management and Disposal," International Association of Information Technology Asset Managers, Nashville, October 2010 Panel moderator, "Technology and Information Security Trends Issues and Concerns for HR Professionals," SHRM Atlanta Conference, October 2010 Distinctions Boy Scouts of America, Eagle Scout Professional and Civic Professional Associations American Corporate Counsel Association Atlanta Bar Association Georgia Bar Association Community Activities Atlanta Chamber of Commerce, Technology Marketing Council Atlanta Legal Diversity Consortium, former board member Boy Scouts of America Chastain Park Conservancy, board member Corporate Leadership Council of Fernbank Museum, board member South Africa Business Chamber of Commerce Professional Activities
5 Georgia Electronic Commerce Association, Privacy Working Group Technology Association of Georgia Information Security Society, board chair Technology Association of Georgia Leadership Council, board member Admissions Georgia
Getting Your Privacy House in Order
Getting Your Privacy House in Order Lisa J. Sotto Ewa Abrams Victoria King Partner Associate General Counsel Global Privacy Officer Hunton & Williams LLP Tiffany & Co. UPS (212) 309-1223 (212) 230-5351
More informationHOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA
HOT TOPICS IN DATA PRIVACY REGULATION IN RUSSIA Ksenia Andreeva Anastasia Dergacheva Vasilisa Strizh November 27, 2018 2018 Morgan, Lewis & Bockius 2017 Morgan, Lewis & Bockius Contents News from the Russian
More informationData Privacy and Cybersecurity
Data Privacy and Cybersecurity Key Contacts Timothy C. Blank Boston +1 617 728 7154 Dr. Olaf Fasshauer National Munich +49 89 21 21 63 28 Joshua H. Rawson New York +1 212 698 3862 Translate Page In an
More informationCOUNTRY PROFILE. Taiwan
COUNTRY PROFILE Taiwan Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Mexico
COUNTRY PROFILE Mexico Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Bulgaria
COUNTRY PROFILE Bulgaria Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Iceland
COUNTRY PROFILE Iceland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationMapping to the National Broadband Plan
The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National
More informationBuilding YOUR Privacy Program: One Size Does Not Fit All. IBM Security Services
Building YOUR Privacy Program: One Size Does Not Fit All Justine Gottshall Partner, InfoLawGroup, LLP Chief Privacy Officer, Signal Jgottshall@infolawgroup.com Adam Nelson Executive Consultant Global Data
More informationCOUNTRY PROFILE. Estonia
COUNTRY PROFILE Estonia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationDeveloping Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?
Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack
More informationAnatomy of a Data Breach: A Practical Guide for Small Law Departments
Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed
More informationCOUNTRY PROFILE AUSTRALIA
COUNTRY PROFILE Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS TRENDS
More informationManuel E. Maisog Partner
Biographies Manuel E. Maisog Partner bmaisog@hunton.com Beijing +86 10 5863 7507 direct Languages: English, Mandarin Chinese SERVICES Industries Energy Financial Services Retail and Consumer Products Practices
More informationDecember 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development
December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationCOUNTRY PROFILE. Italy
COUNTRY PROFILE Italy Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationCOUNTRY PROFILE. Philippines
COUNTRY PROFILE Philippines Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Ireland
COUNTRY PROFILE Ireland Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 18 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Malaysia
COUNTRY PROFILE Malaysia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Croatia
COUNTRY PROFILE Croatia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNTRY PROFILE. Ukraine
COUNTRY PROFILE Ukraine Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationMARKETING ALLIANCE MEDIA KIT 2016/17
1 MARKETING ALLIANCE MEDIA KIT 2016/17 2 Our Audience Social Media over 2.5 million C-Level Executives, NGOs, and business owners Our Magazines Featured on itunes and Google Play and promoted through our
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationencrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?
Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationANTICIPATE. MITIGATE. PROTECT.
ANTICIPATE. MITIGATE. PROTECT. FROM ESSENTIAL NEWS AND EXPERT ANALYSIS TO TOOLS THAT HELP YOU MAP YOUR STRATEGIES, BLOOMBERG LAW: PRIVACY & DATA SECURITY DELIVERS. Stay Connected #BloombergLaw @BloombergLaw
More informationCOUNTRY PROFILE. Qatar
COUNTRY PROFILE Qatar Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)
COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion
More informationCOUNTRY PROFILE. Colombia
COUNTRY PROFILE Colombia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationCYBERSECURITY AND THE MIDDLE MARKET
CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE
More informationCOUNTRY PROFILE. Brazil
COUNTRY PROFILE Brazil Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationWILLIAM RM LONG Partner
Partner London +44 20 7360 3600 +44 20 7626 7937 wlong@sidley.com PRACTICES Banking and Financial Services Healthcare Privacy, Data Security and Information Law INDUSTRIES Financial Services Life Sciences
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationCOUNTRY PROFILE. Korea Republic
COUNTRY PROFILE Korea Republic Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing
More informationCONVERGENCE & NEW MEDIA
CONVERGENCE & NEW MEDIA The team is recognised as real specialists who are very strong in this market and come up with very intelligent solutions to problems. CHAMBERS GLOBAL 2018 ABOUT CLIFFE DEKKER HOFMEYR
More informationPAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016
Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges,
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationCOUNTRY PROFILE. Russia
COUNTRY PROFILE Russia Statistical tables Factor I: Economic Performance WORLD COMPETITIVENESS RANKING 2018 All data are available from the World Competitiveness Online. Visit our eshop 1 COMPETITIVENESS
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationDevelopments in Global Data Protection & Transfer: How They Impact Third-Party Contracts
Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts Rebecca Eisner Partner +1 312 701 8577 reisner@mayerbrown.com Mark Prinsley Partner +44 20 3130 3900] mprinsley@mayerbrown.com
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationState Planning Organization Information Society Department
Information Society Department - October TR. Information Society Department Information Society Strategy Duration / Pro- Post- 1 Formulating the Information Society Strategy All Public Institutions Universities
More information79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90
th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationModerator: Tino Mantella President, Tier4 Advisors
Moderator: Tino Mantella President, Tier4 Advisors On January 9th 2017 Tino Mantella took the helm of one of the fastest growing private companies in Georgia. Serving companies across the globe, Tier4
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationArticle II - Standards Section V - Continuing Education Requirements
Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update
More informationCIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification
CIPP/E CIPT Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification The CIPP/E + CIPT credentials shows you ve got the knowledge to build your organization s privacy
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationWorld Trade Center of Greater Philadelphia: A Gateway to Global Trade. Delaware River Regional Planning Commission April 15, 2005
World Trade Center of Greater Philadelphia: A Gateway to Global Trade Delaware River Regional Planning Commission April 15, 2005 What is a World Trade Center? Perception: A WTC is a building. Reality:
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationOTA Strategic Update Building & Amplifying April 5, 2017
OTA Strategic Update Building & Amplifying April 5, 2017 Reminders OTA Members Only Chatham House Rules Will be Recorded for Member Access Updated 4/7/17 OTA Strategic Update Building & Amplifying Craig
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationHong Kong s Personal Data (Privacy) Ordinance
Asia Privacy Bridge Forum 11 May 2016 Hong Kong s Personal Data (Privacy) Ordinance Fanny Wong Deputy Privacy Commissioner for Personal Data Hong Kong, China The Personal Data Landscape in Asia 2011 2003
More information2.1. Information you provide when you use the Digital Services (including any contact, payment or demographic information).
PRIVACY POLICY Last updated: 4 February 2019 1. OPERATOR OF WWW.HOUSEANDLEISURE.CO.ZA 1.1. This website is operated by Associated Media (Pty) Ltd, 9 th Floor, 80 Strand Street, Cape Town, 8001 ( Associated
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationPrinciples for a National Space Industry Policy
Principles for a National Space Industry Policy Commonwealth of Australia 2011 DIISR 11/144 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced
More informationHistory of NERC December 2012
History of NERC December 2012 Timeline Date 1962-1963 November 9, 1965 1967 1967-1968 June 1, 1968 July 13-14, 1977 1979 1980 Description Industry creates an informal, voluntary organization of operating
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationThe Evolving Threat to Corporate Cyber & Data Security
The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationBenefits of Open Cross Border Data Flows
/SMEWG41/039 Agenda Item: 16.3 Benefits of Open Cross Border Data Flows Purpose: Information Submitted by: United States 41 st Small and Medium Enterprises Working Group Meeting Iloilo, Philippines 23-24
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationMNsure Privacy Program Strategic Plan FY
MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term
More informationDeveloping a Privacy Compliance Program
View the online version at http://us.practicallaw.com/5-617-5067 Developing a Privacy Compliance Program JUSTINE GOTTSHALL, INFORMATION LAW GROUP, AND ADAM C. NELSON, IBM SECURITY SERVICES, WITH PRACTICAL
More informationcosts maximize results minimize legal research Best Practices for Taming e-discovery futurelawoffice.com
Future Law Office: Best Practices for Taming e-discovery maximize results minimize costs legal research e-discovery: Escalating Costs, Increasing Scope Page 1 Developing a Strategy Page 2 e-discovery Response
More informationKISH REMARKS APEC CBPR NOV 1 CYBER CONFERENCE KEIO Page 1 of 5 Revised 11/10/2016
Page 1 of 5 INTRODUCTION Jim, thank you for the kind introduction. It is an honor to join the panel. Congratulations to Dr. Murai and Dr. Tezuka for the success of the Keio Cybersecurity Center. Congratulations
More informationStartup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ):
Privacy Policy Startup Genome LLC and its affiliates ( Startup Genome, we or us ) are committed to protecting the privacy of all individuals who ( you ): visit any websites or mobile sites offered by Startup
More informationU.S. Private-sector Privacy Certification
1 Page 1 of 5 U.S. Private-sector Privacy Certification Outline of the Body of Knowledge for the Certified Information Privacy Professional/United States (CIPP/US ) I. Introduction to the U.S. Privacy
More informationCyber Security in M&A. Joshua Stone, CIA, CFE, CISA
Cyber Security in M&A Joshua Stone, CIA, CFE, CISA Agenda About Whitley Penn, LLP The Threat Landscape Changed Cybersecurity Due Diligence Privacy Practices Cybersecurity Practices Costs of a Data Breach
More informationSteps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.
Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m. The cyber threats are no longer a question of if, but when, a breach will occur. It is important
More informationHistory of NERC January 2018
History of NERC January 2018 Date 1962 1963 The electricity industry created an informal, voluntary organization of operating personnel to facilitate coordination of the bulk power system in the United
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationDiana Korka Economic Affairs Officer, ICT Policy Section UNCTAD
Diana Korka Economic Affairs Officer, ICT Policy Section UNCTAD UNESCAP Regional Consultation on e-commerce for Sustainable Development in Asia and the Pacific Bangkok, 30 October 2017 Information Economy
More information2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society
Resolutions 2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society The Economic and Social Council, Recalling the outcome
More informationPromoting Global Cybersecurity
Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationProtecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014
Protecting Your Business: Best Practices for Implementing a Legally Compliant Cybersecurity Program Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented
More informationCYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions. Regional Headquarters, The University of the West Indies, Mona
2 nd National Conference on CYBER SECURITY AND DATA PROTECTION Theme: Securing Businesses and Public Transactions Regional Headquarters, The University of the West Indies, Mona November 20-21, 2014 Conference
More informationNokia Conference Call 1Q 2012 Financial Results
Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor
More informationGlobal Infrastructure Hub Update. G20 Infrastructure Working Group, January 2019
Global Infrastructure Hub Update G20 Infrastructure Working Group, January 2019 IWG Update Introduction Dear IWG members, After a successful 2018, we start 2019 with great enthusiasm, ready to deliver
More informationBalancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld
Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More information20/09/2013. Global Privacy and Data Protection: Practical Risk Assessment and Governance. Topics
Global Privacy and Data Protection: Practical Risk Assessment and Governance 9 October 2013 Robert Bond, BA, CCEP, HonMIEx Head of Data Protection and Info Security, Speechly Bircham Marti Arvin, CHC-F,
More informationDisruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise
Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationWorld Broadcasting Unions Cyber Security Recommendations
World Broadcasting Unions Cyber Security Recommendations Content Protection and Cyber Security Summit April 8, 2018 John C. Lee, P. Eng. Chairman, NABA Technical Committee NORTH AMERICAN BROADCASTERS ASSOCIATION
More informationChanging the Game: An HPR Approach to Cyber CRM007
Speakers: Changing the Game: An HPR Approach to Cyber CRM007 Michal Gnatek, Senior Vice President, Marsh & McLennan Karen Miller, Sr. Treasury & Risk Manager, FireEye, Inc. Learning Objectives At the end
More information