SlideShare a Scribd company logo
1 of 23
Download to read offline
Navigating COVID-19
Issues: Cyber Security
Basics for the Work
From Home Economy
Presented by the Internet and Privacy
Law Standing Committee of the
Business Law Section and the Antitrust,
UCL and Privacy Committee
MODERATORS
Bennet Kelley
Founder
Internet Law Center
Vice Chair
Internet & Privacy Law
Committee, Business Law Section
@InternetLawCent
Full Bio in
Appendix
Brett Cook
US Privacy Manager,
Wells Fargo
Antitrust, UCL and Privacy
Committee
OUR PANELISTS
Terence Goggin
Specialist Leader, Risk &
Financial Advisory, Federal
Cybersecurity Practice
Deloite
Marcus Morissette
Senior Privacy &
Cybersecurity Advisor
Fenwick & West
Stan Stahl, Ph.D
President
SecureTheVillage
@stanstahl
Full Bio in
Appendix
MARCH 19, 2020 – CALIFORNIA ISSUES
SHELTER IN PLACE ORDER
The California State Public Health Officer and Director of the California
Department of Public Health is ordering all individuals living in the State
of California to stay home or at their place of residence, except as
needed to maintain continuity of operation of the federal critical infrastructure
sectors, critical government services, schools, childcare, and construction,
including housing construction.
 In 2018, approximately 1.1 million Californians worked from home (six percent of the work force).
 While some businesses had work from home policies and procedures in place, the rest are about to
become . . .
“An entrepreneur is
someone who will jump
off a cliff and assemble an
airplane on the way
down.”
-- Reid Hoffman
Founder, LinkedIn
EMPLOYMENT LAW CONSIDERATIONS
 New Hires/ I-9
 Tracking hours and breaks
 Safety issues
 Telecommuting Expenses
 Insurance
 WFH v Working Remotely
 Friday Donuts
Photo by Court Cook on Unsplash
NOT
COVERED
HERE
SECURING THE HOME OFFICE
Part 1: Securing the Network
 Ensure all devices used have
 Properly configured firewalls
 Up-to-date Anti-malware, intrusion prevention software
 Complex Passwords
 Ensure software used is properly licensed
 Secure devices and services with multi-factor authentication
 Use of Virtual Private Networks
 Interplay with Home IoT Devices
 IT Log monitoring
Photo by Paul
Hanaoka on Unsplash
SECURING THE HOME OFFICE
Part 2 – Securing Proprietary Information
 Company v Employee Devices
 Employer Monitoring
 Tracking Hours Worked
(Important for Wage/Hour Issues)
 Tracking Downloads and Emails
 Encryption
 Data Backup
 Account Settings and Access
Sony hack relied upon low-tech spear-phishing
emails. Employees are the weak link in
cybersecurity defense.
• Avoid clicking on links in unsolicited emails
and be wary of email attachments.
• Do not reveal personal or financial
information in emails, and do not respond to
email solicitations for this information.
SECURING THE HOME OFFICE
Part 3 – Employee Training
CORONAVIRUS
SCAMS
• “Public Health” Scams
• Government Check
Scams
• Business Email Scams
• I.T. Scams
• Supply Scams
• Robocall Scams
• Data Scams
CORONAVIRUS CYBER THREATS
• Italy Saw Significant Spike in Cyber Attacks
• Remote User Credential Theft
• Malicious Log in Events
• Fake Coronavirus Websites/ Maps
• Phishing Attacks Using Coronavirus Themes
• Fake Phone Apps
• Coronavirus Themed Domains
• Ransomware Attacks on Medical Institutions
CORONAVIRUS INFORMATION WEBSITES
Center for Disease Control and
Prevention
https://www.cdc.gov/coronavirus/2019-
ncov/index.html
@CDCgov
California Dep’t of Public Health
https://www.cdph.ca.gov/Programs/CID/
DCDC/Pages/Immunization/ncov2019.as
px
@CAPublicHealth
World Health Organization
https://www.who.int/emergencies/disease
s/novel-coronavirus-2019
@WHO
APPENDIX 1
SPEAKER BIOS
BRETT COOK – Wells Fargo
Brett joined the US Navy Judge Advocate General’s (JAG) Corps in 2005. He served as Associate
General Counsel & Senior Privacy Counsel for US Naval bases in the European Union, the Bureau of
Navy Medicine and Surgery, and the Navy’s Expeditionary Operations Command. Subsequently, he
was selected to manage the Navy’s data protection enforcement and Freedom of Information Act
compliance programs.
Brett served as General Counsel & Chief Privacy Officer for an Aircraft Carrier Strike Group, which
manages forward-operating surface vessels, aviation units, and intelligence collection operations; and
the Naval Intelligence Forces Reserve, which oversees Cryptology, Intel, and IT communities across
134 global organizations. He has extensive experience operationalizing regulations, developing
foundational compliance policies, conducting privacy impact assessments and training programs.
Currently, Brett is a US Privacy Manager for Wells Fargo and continues to serve as a US Navy JAG
Corps Reserve Officer.
TERENCE GOGGIN - Deloitte
Terence Goggin is a consultant and entrepreneur with deep expertise in all aspects of
offensive and defensive cyber operations. He is the founder of PocketMac, a
groundbreaking Macintosh software company, which he built into a business
generating revenues of more than $2M per year. He has held a variety of
cybersecurity and leadership roles at the US Department of Defense. In his current
role, he advises government and private organizations on matters of cybersecurity
and risk management.
BENNET KELLEY – Internet Law Center
Bennet founded the Internet Law Center in 2007 after working in-house with technology, e-commerce, and internet
advertising companies such as ETM Entertainment Network, Network Commerce and ValueClick for nearly a decade. He
has been named as among the nation's top internet lawyers by several publications including the Los Angeles Business
Journal which named him one of the Most Influential Lawyers in Digital Media and E-Commerce.
In 2019, Bennet was one of a handful of lawyers, academics, prosecutors, law enforcement and judicial personnel invited to
work with the Department of Justice on addressing ways to combat technologically enabled harassment.
In 2012, he was selected by the U.S. Department of Commerce to be part of the U.S. delegation and present on e-
commerce law at the 17th U.S.-China Legal Exchange. The prior year he was part of a delegation of a dozen North
American internet experts who met with leading Chinese netizens to promote greater freedom within China.
Bennet was also the creator and host of Cyber Law and Business Report which aired on WebmasterRadio.fm from 2011-
2019 and was nominated for a Los Angeles Press Club award.
Bennet is a past Co-Chair (and current Vice Chair) of the California Lawyers' Association's Internet and Privacy Law
Committee where he led the effort to develop a primer on cyberspace law for state policymakers. He also led the
Technology, Internet and Privacy subcommittee of CLA's Intellectual Property Section from 2016-2019.
MARCUS MORISSETTE – Fenwick & West
Marcus Morissette is a Senior Privacy and Cybersecurity Advisor at Fenwick & West.
Marcus has experience leading successful privacy teams through the design and implementation of global privacy and data
governance programs, ensuring compliance with domestic and GDPR regulations. Prior to joining Fenwick, Marcus worked
with eBay, first as the Head of Privacy for eBay Marketplaces, and then as eBay Inc.’s Chief Privacy Officer, leading all
global privacy operations for the company and its associated entities. Marcus also has a seasoned background as an
attorney and corporate counsel to various technology companies where he managed regulatory and compliance matters
including privacy assessments, data security audits, and reduced risk exposure efforts. He has experience completing data
mapping and data inventories of large and complex data environments. He has significant practical information security
experience, having been a certified information security professional, PCI qualified security assessor, and certified
information systems auditor. Marcus also serves as an officer and lawyer in the US Navy Reserve Judge Advocate
General Corps, and holds an active government security clearance.
Marcus received his J.D. from the University of Idaho College of Law. He received his B.A. in Economics from the
University of Maryland.
Marcus is a Fellow of Information Privacy (FIP), Certified Privacy Professional US (CIPP/US), Certified Information Privacy
Technologist (CIPT) and a Certified Information Privacy Manager (CIPM), Certified Information Systems Security
Professional (CISSP). He is licensed to practice law in Washington State.
STAN STAHL, Ph.D. - SecureTheVillage
Dr. Stan Stahl is founder and President of SecureTheVillage, a non-profit providing executives the knowledge and relationships they need to
meet today’s cyber crime, cyber privacy and information security challenges.
Stan is also co-founder and President of Citadel Information Group, an information security management services firm recently acquired by
Top-100 CPA firm, Miller Kaplan. The firm delivers Information Peace of Mind ® to business and the not-for-profit community.
Stan serves on the California Cybersecurity Task Force; the Industry Advisory Board of the Information Technology Program at the Viterbi
School of Engineering at USC; the Advisory Board of UCLA Extension’s Emergency Management & Homeland Security and Enterprise Risk
Management Programs; and the Board of Directors of the Content Delivery & Security Association.
A pioneer in the field of information security, Stan began his career securing teleconferencing at the White House, databases inside Cheyenne
Mountain and the communications network controlling our nuclear weapons arsenal. Stan received his Ph.D. degree in mathematics from The
University of Michigan. A frequent speaker on cybersecurity, Stan is regularly quoted in the media on cybercrime, cyber privacy and information
security.
Dr. Stahl earned his Ph.D. in mathematics from The University of Michigan and spent nearly 15 years teaching university mathematics. Once an
active researcher, Dr. Stahl has published more than a dozen papers in advanced mathematics and computer science. He has taught courses
in information security, software engineering, project management and computer programming at several universities and colleges. He recently
served on the faculty at the University of Southern California in the School of Engineering’s Information Technology Program.
APPENDIX 2
RESOURCES
CYBERSECURITY RESOURCES - 1
Department of Commerce
National Institute of Standards and Technology
• Telework Security Basics
• Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
• User’s Guide to Telework and Bring Your Own Device (BYOD) Security
• Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions
Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
• Risk Management for Novel Coronavirus (COVID-19)
• Alert (AA20-073A): Enterprise VPN Security
• Security Tip (ST04-014): Avoiding Social Engineering and Phishing Attacks
CYBERSECURITY RESOURCES - 2
Federal Trade Commission
• Online security tips for working from home
•
• Cybersecurity For Small Business
Center for Internet Security
• CIS Controls Telework and Small Office Network Security Guide
Electronic Frontier Foundation
• Phishing in the Time of COVID-19: How to Recognize Malicious Coronavirus Phishing Scams
Stay Safe Online
• COVID-19 Security Resource Library
CORONAVIRUS SCAM RESOURCES
Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
• Defending Against COVID-19 Cyber Scams
Federal Trade Commission
• Coronavirus: Scammers follow the headlines|
• FTC: Coronavirus scams, Part 2
• Seven Coronavirus scams targeting your business
• Scammers are taking advantage of fears surrounding the Coronavirus
Better Business Bureau
• BBB tips on COVID-19 (coronavirus)

More Related Content

What's hot

American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraKapil Mehrotra
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Shawn Tuma
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinFecomercioSP
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 

What's hot (20)

Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 

Similar to Cyber Security Basics for the WFH Economy

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Shawn Tuma
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
 
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & MisinformationCorum Group
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Paul Misner Resume
Paul Misner ResumePaul Misner Resume
Paul Misner ResumeCybryx
 
Service Provider Oversight
Service Provider OversightService Provider Oversight
Service Provider OversightNICSA
 

Similar to Cyber Security Basics for the WFH Economy (20)

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board Members
 
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
2014 Tech M&A Monthly - Myths, Misconceptions, & Misinformation
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
CorpExecProfile
CorpExecProfileCorpExecProfile
CorpExecProfile
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Paul Misner Resume
Paul Misner ResumePaul Misner Resume
Paul Misner Resume
 
Service Provider Oversight
Service Provider OversightService Provider Oversight
Service Provider Oversight
 

More from Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 
Good jobs first backgrounder
Good jobs first backgrounderGood jobs first backgrounder
Good jobs first backgrounder
 

Recently uploaded

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 

Recently uploaded (20)

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 

Cyber Security Basics for the WFH Economy

  • 1. Navigating COVID-19 Issues: Cyber Security Basics for the Work From Home Economy Presented by the Internet and Privacy Law Standing Committee of the Business Law Section and the Antitrust, UCL and Privacy Committee
  • 2. MODERATORS Bennet Kelley Founder Internet Law Center Vice Chair Internet & Privacy Law Committee, Business Law Section @InternetLawCent Full Bio in Appendix Brett Cook US Privacy Manager, Wells Fargo Antitrust, UCL and Privacy Committee
  • 3. OUR PANELISTS Terence Goggin Specialist Leader, Risk & Financial Advisory, Federal Cybersecurity Practice Deloite Marcus Morissette Senior Privacy & Cybersecurity Advisor Fenwick & West Stan Stahl, Ph.D President SecureTheVillage @stanstahl Full Bio in Appendix
  • 4. MARCH 19, 2020 – CALIFORNIA ISSUES SHELTER IN PLACE ORDER The California State Public Health Officer and Director of the California Department of Public Health is ordering all individuals living in the State of California to stay home or at their place of residence, except as needed to maintain continuity of operation of the federal critical infrastructure sectors, critical government services, schools, childcare, and construction, including housing construction.  In 2018, approximately 1.1 million Californians worked from home (six percent of the work force).  While some businesses had work from home policies and procedures in place, the rest are about to become . . .
  • 5. “An entrepreneur is someone who will jump off a cliff and assemble an airplane on the way down.” -- Reid Hoffman Founder, LinkedIn
  • 6. EMPLOYMENT LAW CONSIDERATIONS  New Hires/ I-9  Tracking hours and breaks  Safety issues  Telecommuting Expenses  Insurance  WFH v Working Remotely  Friday Donuts Photo by Court Cook on Unsplash NOT COVERED HERE
  • 7. SECURING THE HOME OFFICE Part 1: Securing the Network  Ensure all devices used have  Properly configured firewalls  Up-to-date Anti-malware, intrusion prevention software  Complex Passwords  Ensure software used is properly licensed  Secure devices and services with multi-factor authentication  Use of Virtual Private Networks  Interplay with Home IoT Devices  IT Log monitoring Photo by Paul Hanaoka on Unsplash
  • 8. SECURING THE HOME OFFICE Part 2 – Securing Proprietary Information  Company v Employee Devices  Employer Monitoring  Tracking Hours Worked (Important for Wage/Hour Issues)  Tracking Downloads and Emails  Encryption  Data Backup  Account Settings and Access
  • 9. Sony hack relied upon low-tech spear-phishing emails. Employees are the weak link in cybersecurity defense. • Avoid clicking on links in unsolicited emails and be wary of email attachments. • Do not reveal personal or financial information in emails, and do not respond to email solicitations for this information. SECURING THE HOME OFFICE Part 3 – Employee Training
  • 10. CORONAVIRUS SCAMS • “Public Health” Scams • Government Check Scams • Business Email Scams • I.T. Scams • Supply Scams • Robocall Scams • Data Scams
  • 11. CORONAVIRUS CYBER THREATS • Italy Saw Significant Spike in Cyber Attacks • Remote User Credential Theft • Malicious Log in Events • Fake Coronavirus Websites/ Maps • Phishing Attacks Using Coronavirus Themes • Fake Phone Apps • Coronavirus Themed Domains • Ransomware Attacks on Medical Institutions
  • 12. CORONAVIRUS INFORMATION WEBSITES Center for Disease Control and Prevention https://www.cdc.gov/coronavirus/2019- ncov/index.html @CDCgov California Dep’t of Public Health https://www.cdph.ca.gov/Programs/CID/ DCDC/Pages/Immunization/ncov2019.as px @CAPublicHealth World Health Organization https://www.who.int/emergencies/disease s/novel-coronavirus-2019 @WHO
  • 14. BRETT COOK – Wells Fargo Brett joined the US Navy Judge Advocate General’s (JAG) Corps in 2005. He served as Associate General Counsel & Senior Privacy Counsel for US Naval bases in the European Union, the Bureau of Navy Medicine and Surgery, and the Navy’s Expeditionary Operations Command. Subsequently, he was selected to manage the Navy’s data protection enforcement and Freedom of Information Act compliance programs. Brett served as General Counsel & Chief Privacy Officer for an Aircraft Carrier Strike Group, which manages forward-operating surface vessels, aviation units, and intelligence collection operations; and the Naval Intelligence Forces Reserve, which oversees Cryptology, Intel, and IT communities across 134 global organizations. He has extensive experience operationalizing regulations, developing foundational compliance policies, conducting privacy impact assessments and training programs. Currently, Brett is a US Privacy Manager for Wells Fargo and continues to serve as a US Navy JAG Corps Reserve Officer.
  • 15. TERENCE GOGGIN - Deloitte Terence Goggin is a consultant and entrepreneur with deep expertise in all aspects of offensive and defensive cyber operations. He is the founder of PocketMac, a groundbreaking Macintosh software company, which he built into a business generating revenues of more than $2M per year. He has held a variety of cybersecurity and leadership roles at the US Department of Defense. In his current role, he advises government and private organizations on matters of cybersecurity and risk management.
  • 16. BENNET KELLEY – Internet Law Center Bennet founded the Internet Law Center in 2007 after working in-house with technology, e-commerce, and internet advertising companies such as ETM Entertainment Network, Network Commerce and ValueClick for nearly a decade. He has been named as among the nation's top internet lawyers by several publications including the Los Angeles Business Journal which named him one of the Most Influential Lawyers in Digital Media and E-Commerce. In 2019, Bennet was one of a handful of lawyers, academics, prosecutors, law enforcement and judicial personnel invited to work with the Department of Justice on addressing ways to combat technologically enabled harassment. In 2012, he was selected by the U.S. Department of Commerce to be part of the U.S. delegation and present on e- commerce law at the 17th U.S.-China Legal Exchange. The prior year he was part of a delegation of a dozen North American internet experts who met with leading Chinese netizens to promote greater freedom within China. Bennet was also the creator and host of Cyber Law and Business Report which aired on WebmasterRadio.fm from 2011- 2019 and was nominated for a Los Angeles Press Club award. Bennet is a past Co-Chair (and current Vice Chair) of the California Lawyers' Association's Internet and Privacy Law Committee where he led the effort to develop a primer on cyberspace law for state policymakers. He also led the Technology, Internet and Privacy subcommittee of CLA's Intellectual Property Section from 2016-2019.
  • 17. MARCUS MORISSETTE – Fenwick & West Marcus Morissette is a Senior Privacy and Cybersecurity Advisor at Fenwick & West. Marcus has experience leading successful privacy teams through the design and implementation of global privacy and data governance programs, ensuring compliance with domestic and GDPR regulations. Prior to joining Fenwick, Marcus worked with eBay, first as the Head of Privacy for eBay Marketplaces, and then as eBay Inc.’s Chief Privacy Officer, leading all global privacy operations for the company and its associated entities. Marcus also has a seasoned background as an attorney and corporate counsel to various technology companies where he managed regulatory and compliance matters including privacy assessments, data security audits, and reduced risk exposure efforts. He has experience completing data mapping and data inventories of large and complex data environments. He has significant practical information security experience, having been a certified information security professional, PCI qualified security assessor, and certified information systems auditor. Marcus also serves as an officer and lawyer in the US Navy Reserve Judge Advocate General Corps, and holds an active government security clearance. Marcus received his J.D. from the University of Idaho College of Law. He received his B.A. in Economics from the University of Maryland. Marcus is a Fellow of Information Privacy (FIP), Certified Privacy Professional US (CIPP/US), Certified Information Privacy Technologist (CIPT) and a Certified Information Privacy Manager (CIPM), Certified Information Systems Security Professional (CISSP). He is licensed to practice law in Washington State.
  • 18. STAN STAHL, Ph.D. - SecureTheVillage Dr. Stan Stahl is founder and President of SecureTheVillage, a non-profit providing executives the knowledge and relationships they need to meet today’s cyber crime, cyber privacy and information security challenges. Stan is also co-founder and President of Citadel Information Group, an information security management services firm recently acquired by Top-100 CPA firm, Miller Kaplan. The firm delivers Information Peace of Mind ® to business and the not-for-profit community. Stan serves on the California Cybersecurity Task Force; the Industry Advisory Board of the Information Technology Program at the Viterbi School of Engineering at USC; the Advisory Board of UCLA Extension’s Emergency Management & Homeland Security and Enterprise Risk Management Programs; and the Board of Directors of the Content Delivery & Security Association. A pioneer in the field of information security, Stan began his career securing teleconferencing at the White House, databases inside Cheyenne Mountain and the communications network controlling our nuclear weapons arsenal. Stan received his Ph.D. degree in mathematics from The University of Michigan. A frequent speaker on cybersecurity, Stan is regularly quoted in the media on cybercrime, cyber privacy and information security. Dr. Stahl earned his Ph.D. in mathematics from The University of Michigan and spent nearly 15 years teaching university mathematics. Once an active researcher, Dr. Stahl has published more than a dozen papers in advanced mathematics and computer science. He has taught courses in information security, software engineering, project management and computer programming at several universities and colleges. He recently served on the faculty at the University of Southern California in the School of Engineering’s Information Technology Program.
  • 20.
  • 21. CYBERSECURITY RESOURCES - 1 Department of Commerce National Institute of Standards and Technology • Telework Security Basics • Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security • User’s Guide to Telework and Bring Your Own Device (BYOD) Security • Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions Department of Homeland Security Cybersecurity and Infrastructure Security Agency • Risk Management for Novel Coronavirus (COVID-19) • Alert (AA20-073A): Enterprise VPN Security • Security Tip (ST04-014): Avoiding Social Engineering and Phishing Attacks
  • 22. CYBERSECURITY RESOURCES - 2 Federal Trade Commission • Online security tips for working from home • • Cybersecurity For Small Business Center for Internet Security • CIS Controls Telework and Small Office Network Security Guide Electronic Frontier Foundation • Phishing in the Time of COVID-19: How to Recognize Malicious Coronavirus Phishing Scams Stay Safe Online • COVID-19 Security Resource Library
  • 23. CORONAVIRUS SCAM RESOURCES Department of Homeland Security Cybersecurity and Infrastructure Security Agency • Defending Against COVID-19 Cyber Scams Federal Trade Commission • Coronavirus: Scammers follow the headlines| • FTC: Coronavirus scams, Part 2 • Seven Coronavirus scams targeting your business • Scammers are taking advantage of fears surrounding the Coronavirus Better Business Bureau • BBB tips on COVID-19 (coronavirus)