- This event has passed so registration is closed.
Ransomware continues to be one of the fastest growing cyber-attacks, with a 62% year-over-year increase. What is your company doing in advance of a ransomware attack to mitigate the damage? Are you proactively working with your legal team to ensure that contracts and clauses include business partners or cloud providers?
Join us for this session on ransomware where we will be focusing on how you can protect your organization from an attack while preparing for the worst. Discussion topics include:
- Legal challenges of ransomware
- Regulatory issues around ransomware
- Questions you should be asking of your ransomware insurers
- What policies you should have in place
- The risks associated with not paying the ransom
- The legal risks associated with paying the ransom
- Using an escrow agent
This session will reinforce the steps you need to take before and after a ransomware attack.
Henry Nduka Onyiah
Henry Nduka Onyiah is an Information Security & Privacy Consultant who, for well over a decade, has provided leadership and direction while working collaboratively with cross-functional teams on information security & privacy related engagements within the Europe, Middle East & Africa (EMEA) region.
Amongst others, the scope of his engagements has included developing & maintaining strong engagement with technology & risk functions, business owners & other relevant stakeholders to –
- develop & improve operational cyber risk frameworks;
- advise on the management of risk and the effectiveness of mitigating controls;
- provide subject matter expertise against the backdrop of various IT Risk & Governance related frameworks; and
- the development and facilitation of tailored training and awareness programmes on risk management in relation to information security & privacy.
He holds and maintains certifications from several professional bodies amongst which include Fellow of Information Privacy (FIP), Certified Information Privacy Professional/Europe (CIPP/E), Certified Information Privacy Manager (CIPM) & Certified Data Privacy Solutions Engineer (CDPSE).
Professional bodies in which he maintains Professional Membership &/or active participation include the British Computer Society (Chartered Institute of IT) (BCS), Chartered Institute of Information Security (CIISec), Information Systems and Controls Association (ISACA), Information Systems Security Association (ISSA), Institute of Risk Management (IRM), International Association of Privacy Professionals (IAPP) and International Information Systems Security Certification Consortium (ISC2).
He currently one of the Co-Chairs of ISSA's Privacy Special Interest Group and a Founding Ambassador of the Institute of Operational Privacy Design (IOPD). He is also involved in advocacy and research involving the analysis of risks to privacy arising from ‘emerging’ technology which aims to highlight issues that may undermine respective legislative and regulatory data privacy/protection frameworks as well as cause harms to the fundamental right to privacy of individuals.
Aside enjoying the company of his wife and son, especially given the improved opportunities to achieve better work-life balance in a post pandemic world, he enjoys an ongoing struggle to develop the consistency required to reduce his golf handicap as well as reading and travelling. He also actively supports charity work especially within the Province of Bedfordshire in the United Kingdom.
Mark D. Rasch – Of Counsel, Kohrman Jackson & Krantz LLP
Mark Rasch is a lawyer and computer security and privacy expert and a lawyer in Bethesda, Maryland and a Professor of Cyberlaw and Cyber-crime at George Washington University School of Law.
Rasch’s career spans more than 35 years of corporate and government cybersecurity, computer privacy, regulatory compliance, computer forensics and incident response. Earlier in his career, Rasch was with the U.S. Department of Justice where he led the department’s efforts to investigate and prosecute cyber and high-technology crime, starting the computer crime unit within the Criminal Division’s Fraud Section, efforts which eventually led to the creation of the Computer Crime and Intellectual Property Section of the Criminal Division. He was responsible for various high-profile computer crime prosecutions, including Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris.
Mark is a frequent commentator in the media on issues related to information security and is the author of hundreds of articles about the Internet, Internet privacy, hacking, cryptocurrency, blockchain and ransomware.
See Mark D. Rasch‘s full profile.
Suzanne Gorman – Vice President, Information Security and Risk Management Evangelist, Global Learning Systems
Vice President, Information Security, and Risk Management Evangelist at Global Learning Systems. Suzanne is well known for designing and implementing comprehensive information security programs, with an emphasis on security awareness training. She holds both CISSP and CRISC certifications. Suzanne has spent most of her 35+year career on Wall Street leading large Information Security teams. Suzanne was an active contributor to numerous government councils and advisory committees, she worked on government initiatives at both state and federal levels. Suzanne has served as the Chairperson of the Financial Services Information Sharing Analysis Center (FS/ISAC) and ISAC Council. She has testified before Congress on “Cybersecurity for The Homeland.” Information Security Magazine honored Suzanne with a “Women of Vision” award naming her one of the top 25 most influential women in the information security industry. Network World also named Suzanne one of “The 50 Most Powerful People in Networking” and “Top 100 Women Leaders of Tampa for 2022.”
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.