Like all software components and tools, use of open-source software poses cybersecurity risks. The Log4j vulnerability, which posed a risk to many, if not most, companies is a great example. In this presentation, we will discuss open-source vulnerabilities (including Log4j), recent activity and interest by the federal government in cybersecurity, and tips for best practices in minimizing risks.
Presenters
Mindi S. Giftos, Partner
Eric J. Rakestraw, Partner
Who Should Attend
General counsel, CIOs, vice presidents, risk managers, compliance officers and others working with corporate intellectual property.
Continuing Education Credit
This program is pending approval for Illinois, Iowa, Kansas, Missouri, Nebraska, Tennessee, Texas and Wisconsin continuing legal education credit.