2016 SoCal

November 6-7, 2016


Pelican Hill

2016 Cybersecurity, Privacy & Data Protection Retreat

Our Retreat is an informative and interactive gathering of corporate executives, in-house lawyers, outside counsel, judges, thought leaders, and top-rated cybersecurity, privacy and data protection service and technology vendors. Nationwide, surveys show that most organizations have experienced a data breach, whether they know it or not. When it happens, organizations that practice good information governance are in a better position to recover than those that do not.

The foundation of any good information security program is good information governance. In order to secure and protect your data you must know what you have and where it is – usually not a simple task. Our panel discussions, “war stories” and lessons learned will explore what companies are doing to understand and document business data flows, storage, and backups, making the effort of cybersecurity more manageable and effective. We will look at the policies and business practices pertaining to information throughout its lifecycle and how a cross-functional team, including those from information technology, legal, and the business side, should be involved to balance efficiency, profits, and risk, and ensure proper data protection.

Whether you are new to the cybersecurity, privacy and data protection industry and are seeking more information or want to increase your existing expertise, our Retreats will allow you to explore the latest issues and strategies with knowledgeable and experienced consultants, technologists, lawyers, thought leaders and your peers – all in one of California's most beautiful places to visit: Newport Coast

With a full agenda of educational sessions, scheduled networking events, and family-friendly locations, you won’t want to miss out on the opportunity to learn about these key issues in this relaxed setting. We invite you to explore our website, contact us with questions, and join us at this upcoming Retreat – where questions are answered at unquestionably scenic locations.


Join us for one day of discussions about the hot topics in ​cybersecurity, privacy and data protection. You’ll come away with a better understanding of current trends, best practices and emerging technologies.


Pelican Hill
22701 S Pelican Hill Rd
Newport Coast, CA 92657
Phone: (855) 315-8214
Website: www.pelicanhill.com


John Wayne Airport (SNA)
18601 AirportWay
Santa Ana, CA 92707
Phone: (949) 252-5200

Los Angeles International Airport (LAX)
1 World Way
Los Angeles, CA 90045
Phone: (310) 646-5252
Website: www.lawa.org
Airlines: www.lawa.org/laxairlines

San Diego International Airport (SAN)
3225 N Harbor Dr
San Diego, CA 92101
Phone: (619) 400-2404
Website: www.san.org
Airlines: www.san.org/Flights/Airlines


Please email info@thinkingenious.com for reservation instructions.





The human factor is the most important element of a company’s cyber defense profile. Experts say that well over 90% of all hacks are attributable to human error, negligence or recklessness. Every feature of a company’s cyber defense is driven by human thinking and behavior - from the baseline understanding of a company’s vulnerabilities, design and implementation of defenses, interaction with cybersecurity vendors and responding to threats and breaches. Yet the human factor seldom gets the attention it deserves, either in the media or in organizations trying to protect themselves from hackers. This panel will explore the human factor in cybersecurity and how it can be used to optimize an organization’s cybersecurity profile. Sponsored By jmbm-logo-2
Today's cyber criminals use automated tools to discover and exploit vulnerabilities in your network. Learn how you how to get more precise, real-time threat intelligence about the risks to your network/data, and then automate defenses to close the gap between identification of the threat and auto-action against the threat. . . without breaking the bank! Sponsored By bandura-logo
After a cyber intrusion a company should engage outside counsel to retain all third party investigators, and then outside counsel participates in all emails and discussions with the IT, CISO, and forensic investigators. As a result all communications between the outside counsel, client IT, and third party investigators are protected as attorney-work product which is particularly valuable since not all in-house counsel communications may be considered confidential. This only works if outside counsel can truly communicate and understand the IT and cyber jargon. Sponsored By unspecified
The reliance on third parties to manage an organization’s sensitive data or critical infrastructure presents unique cybersecurity and data privacy challenges. This session will review the vendor management lifecycle and dive into some key challenges, including the pros and cons of particular contractual requirements for data security, and being prepared to prevent or mitigate a vendor’s data breach. Sponsored By Reed logo
The Department of Homeland Security’s SAFETY Act program has taken on increased significance since it began in 2002, and has become a “must know” option for companies that sell or buy cybersecurity products or services. The SAFETY Act program is the only mechanism in the world that provide companies the ability to mitigate their legal and financial exposure in the event of a terrorism event while, at the same time, differentiating their products or services in the marketplace. This panel will address how the SAFETY Act works, the kinds of products and services can be protected by the SAFETY Act, how companies can leverage the SAFETY Act certification to their advantage, and the application process for gaining SAFETY Act recognition. The panel is appropriate for business leaders in companies of all sizes, both domestic and foreign. Sponsored By baker-logo
Much InfoSec attention has focused on securing email and transactional systems that store credit card numbers, SSANs, and other PII. This session focuses on the equally important but less-often covered topic of securing critical “unstructured” content stored across the enterprise in file shares and content management systems - how to classify it, apply and enforce retention periods, and control and track access to it. Without an effective program to manage unstructured content, an organization’s most valuable and sensitive information can end up in the hands of competitors, news media, or hostile governments. Sponsored By beyondrecognitionlogo-300x45
The panel discussion will cover hot ecommerce litigation involving claims of impermissible tracking, accessing contact lists, scanning of URLs, and “misappropriation of likeness.” The discussion will also touch upon existing and upcoming regulatory issues, especially as more and more cross-platform data is being used with the “internet of things (IoT).” Sponsored By Print
This panel will examine the FTC’s cybersecurity-related enforcement activity during 2016 and offer predictions about what to expect in 2017. Included in the discussion will be reaction to the FTC’s recent guidance regarding the NIST Framework, ransomware, and the ongoing litigation involving LabMD. We will also provide insight into what data security measures companies should take to help insulate themselves from FTC enforcement action in the event of a data breach. Sponsored By snell-and-wilmer-logo-2
Data has never been more global, and yet the legal and regulatory landscape that applies to that data is in constant flux. This panel will discuss the changing legal and regulatory landscape for privacy and cybersecurity around the world (especially in the European Union and Asia), the resulting challenges facing U.S. companies that do business internationally, and give practical examples of how companies are addressing these challenges. Sponsored By mcdermott-logo-jpg-2
Financial institutions have recognized the need to develop new products and services that appeal to Millennials which is bringing them more and more into the Internet of Things. This will create more regulatory and practical challenges from a privacy/cybersecurity perspective. The panel will explore these challenges and possible solutions. Sponsored By promontory-logo-2