Data Privacy and Cyber Liability

Location: Hodges University Naples Campus, Stock Building

About This Event

Register Online

Download a Registration Form.

Event Pricing

Individual tickets - $99

Title Sponsor - $2,500
Benefits include:
  • Logo on event flyer
  • Signage at the event
  • Recognition during the event
  • Full page ad in event program
  • Company website link included on the IFI event website
  • Two complimentary registrations to event

Breakfast Sponsor - $1,000 (SOLD)

Benefits include:
  • Signage on breakfast table
  • Recognition during the event
  • Full page ad in event program
  • Company website link included on the IFI event website
  • One complimentary registration to event

Break Sponsor - $500
Benefits include:
  • Signage on break refreshment table
  • Recognition during the event
  • Logo on event program
  • Company logo included on IFI event website
  • One complimentary registration to event

Event Schedule

8:00 - 8:30 a.m. Registration and breakfast
8:30 - 8:35 a.m. Welcome
8:35 - 9:35 a.m. 'Deter, Detect, Defend' presented by Greg Scasny, Cybersecurity Defense Solutions
9:35 - 9:45 a.m. Break
9:45-10:45 a.m. 'Protecting the Past' presented by John Benkert, CPR Tools
10:45-10:55 a.m. Break
10:55-11:55 a.m. 'Creating a Data Privacy Plan' presented by Thomas Rinaldi, Bond, Schoeneck and King
11:55 a.m.-12:00 p.m. Wrap-up and sponsor recognition



Greg Scasny
Deter, Detect, Defend

Today, cyber threats and data breaches are a daily occurrence. Understanding how these data breaches happen and how to detect and defend against them is key for businesses of all sizes, from mom and pop's to large enterprises. We will discuss how attackers gain access to networks (high, non-technical level) and how businesses can detect and protect themselves from today's cyber criminals.

Greg Scasny is currently the chief executive officer of Cybersecurity Defense Solutions (CDS). He leads the strategic and technological vision for the information security business solutions within CDS.

john-300 John Benkert
Protecting the Past

The media today focuses on the sensational stories like Target, Sony, and more recently the Wendy's breach, but there is a much more prevalent way that our data is breached that not very many people talk about. It involves what we do with our old equipment when we are done with it, and it’s called End-of-Life or 'EOL' data security. Find out the how and why behind this often overlooked link in the data life cycle chain. Learn how to protect yourself and just how far the bad guys are willing to go to get their hands on your personal data. 

John Benkert is currently the chief executive officer for CPR Tools Inc. in Fort Myers, Florida. He leads the business creation, communication, vision, and implementation strategy for both the data security and data recovery business solutions within CPR Tools Inc.

Thomas Rinaldi
Creating a Data Privacy Plan

The purpose of Thomas’ presentation “Creating a Data Privacy Plan” is to provide you with the who, what, when, why, and how’s of cyber-security issues faced by local businesses after a data breach. The presentation will address who should be notified after a data breach occurs; what type of notification is required and what liability your company may face as a result; why notification is necessary; and, how to create and implement a data privacy plan to protect your company from potential liability. As part of the presentation, you will be provided a checklist that can be used to create a data privacy plan in an effort to mitigate the significant costs of remediating a data breach.

Thomas Rinaldi is a trial attorney at Bond Schoeneck & King PLLC in Naples, Florida, concentrating his practice on general business and commercial litigation and cybersecurity issues. He has represented large insurance carriers, financial institutions, small businesses, nonprofit organizations, professionals, and individuals.

Register Online

Download a Registration Form.

Ready to learn more?

My name is and I'm from . I would like to know more about at Hodges.You can reach me at and .

Permission to Contact:
Yes you may contact me. I understand that by submitting this form, I may be contacted by Hodges University
or its representatives by phone, SMS, email or postal mail. Data rates may apply.