Attorneys from Foster Swift law firm along with other guest speakers will be in Southfield on October 4th from 7:45 AM until 11:00 AM to present on how to help organizations determine the legal and technical processes businesses need to have in place. Executives, businesses owners, and all management personnel are encouraged to attend. The seminar is free to attend but registration is required. Free Seminar: Cyber-Security: It’s Not If, It’s WhenSouthfield, Mich.
In this segment MBN’s Jeffrey Mosher catches up with Taylor Gast an attorney practicing Business and Commercial Law, Foster Swift Collins & Smith, Lansing, MI to find out all the details about this upcoming event.
The recent Equifax hack is a reminder that all organizations are at risk for a cyber-security breach. Speakers from Foster Swift Collins & Smith PC and Application Specialist Kompany (ASK) will help organizations determine the legal and technical processes businesses need to have in place. Executives, businesses owners, and all management personnel are encouraged to attend. The seminar takes place on Wednesday, October 4th from 7:45 AM-11:00 AM at Regency Manor 25228 Twelve Mile Rd. Southfield, MI 48034. Refreshments will be provided and it is free to attend but registration is required at: http://bit.ly/SouthfieldCyberSecurity.
Speakers include: Sam McLane, Head of Security Operations, Arctic Wolf Networks Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Sam will talk on “Cybersecurity War Stories: Tales from the Trenches” and will share accounts on how business can be brought to a grinding halt by breeches in a business’ critical data.
Josh Gembala, ASK Enhanced Security Services Manager Josh Gembala will cover technical processes that businesses need to implement, establishing ASK as a leader in the Cybersecurity Marketplace.
John Mashni, Alex Ayer and Taylor Gast, Foster Swift Attorneys Attorneys John Mashni, Alex Ayar and Taylor Gast will focus on the proactive steps organizations should take to minimize legal risks related to security breaches as well as legal responsibilities of when a security breach occurs.
For more knowledge, news, and insights visit:
{{cta(‘18154b7e-903e-456c-b271-855c59ef023b’)}}