Cybersecurity Webinar
Webinar
View all events or more Webinars.
9:00 AM PDT (San Francisco, U.S.)/10:00 AM MDT (Salt Lake City, U.S.)/
11:00 AM CDT (Chicago, U.S.)/12:00 PM EDT (New York, U.S.)/
4:00 PM GMT/5:00 PM BST (London, UK)/6:00 PM CEST (Paris, France)
12:00 CST AM (Shanghai, China)/1:00 AM JST (Tokyo, Japan)
2:00 AM AEST (Sydney, Australia)
This session explores how legal privilege can be preserved – or inadvertently lost – during a cyber incident. Using practical, non-technical examples, it will highlight common pitfalls that arise during investigations, communications, and third party engagement, and outline key steps lawyers can take to help ensure sensitive assessments remain protected.
Iker Dieguez is a partner at Cacheaux Cavazos & Newton, where he has worked since 1999. His practice centers on corporate and securities, industrial property, international trade, customs and real estate issues. Iker completed his legal studies and received his law degree from the Universidad Iberoamericana in Mexico City.
Ankur Sheth, of FTI Consulting, is a senior cybersecurity leader with more than 20 years of experience in cybersecurity and data privacy. He is recognized for driving enterprise-wide cybersecurity transformation and resilience. Ankur brings deep expertise in cybersecurity strategy, risk management, and technology implementation applying comprehensive knowledge of controls, processes, and emerging technologies to guide client engagements from strategy and assessment through architecture, design, and execution.
Steven Teppler is a partner at Mandelbaum Barrett PC and chairs the firm’s Privacy and Cyber Security Practice Group. He has been involved in cybersecurity and electronic discovery matters since 2000. Steven’s background is diverse, and combines extensive technology and class action litigation and electronic discovery expertise. He holds six patents involving robust cryptographic methodology, led a tech startup providing content authentication technology, and has subject matter expertise on issues relating to cybersecurity, privacy, and blockchain technology that should be considered prior to launching a new electronic business.