Teleconference Details

Title: Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 1 of 2)

Date: October 24, 2017

Time: Noon ET (60 Minutes)

Guest Speaker: M. Lisa Shasteen, Esq., Shasteen & Percy, P.A.

Host:  John A. Warnick, Esq., Founder, Purposeful Planning Institute

The news is awash with reports of identity theft.  Equifax, Sony, Office of Personnel Management (OPM), Anthem and other hacks increasingly dominate the news and even bring our national election into question.  We hear of ransomware hitting Merck Pharmaceuticals and our local hospitals.  Insiders at Wells Fargo are using our identities to churn accounts for bonuses.  Power grids and water supply systems are at risk, and the FBI reports that business email compromise (BEC) is a primary threat to all businesses within the United States.

Why is this happening, and what can we do to protect ourselves? Should we even try?  What are our legal obligations to our clients and employees?  We have become completely reliant upon cutting-edge technologies.  We love their convenience but often do not grasp the behavioral and organizational changes these new capabilities require, nor the vulnerabilities they create.  Criminals rely on our inertia and procrastination.  The good news is that there are some relatively simple and inexpensive steps that everyone can take to greatly enhance security.  The first step is to change our mental models.

This session will investigate the invisible rise of a cultural meme every bit as relentless and destructive as a hurricane and some relatively simple steps we can all take to better secure ourselves and others we have a duty to protect.

Part 1 (October 24) will explore the various sources of threats to privacy and security, what the threat actors want, and why they want it.  We will focus on the most urgent threats to business today, as identified by the FBI.

Part 2 (October 31) will discuss best practices for cybersecurity and data privacy, as well as federal and state legal considerations that drive business requirements.

Introduction to Our Guest Speaker

LISA SHASTEEN, ESQ. Lisa is co-founder and CEO of Shasteen & Percy, P.A., a law firm focused on cybersecurity and data privacy law. She is also COO of CEO Effectiveness, LLC, a coaching firm that works with top management to achieve exponential results.  She is former Senior Vice President and General Counsel for an international investment and merchant bank focused on digital and technology companies with 17 offices worldwide and $3 billion under management. While there, she was also a member of the Board of Directors of the International institute of Communications based in London, England, with membership spanning over 150 countries.  The IIC fosters global communication and cooperation among regulators, communication and technology company executives, and academic leaders in the communication space.

Lisa has a Juris Doctor degree from Stetson University College of Law and trained in cyber security at Georgetown University.  Her practice focuses on data privacy law and cybersecurity strategy, including the preparation of information security and breach response plans, performance of risk assessments, the development of training systems, and plan implementation at the C-suite and boardroom level.  Lisa’s background includes 27 years in regulatory law.

Lisa has written many articles which have been published, including an article about the use of technology to change the economic base of a society published by The Wall Street Journal Asia.  In addition to membership in other notable organizations, Lisa is an active member of the American Committee on Foreign Relations, a lifetime member of the Armed Forces Communications and Electronics Association (AFCEA), a member of the Florida Bar, the American Bar Association Technology Committee, and the International Association of Privacy Professionals.  She also sits on the Board of Directors of the Tampa Bay Chapter of InfraGard, a public-private partnership with the FBI with a mission of sharing information to protect the security of America’s 16 critical infrastructure sectors against security threats, including threats to cybersecurity.

Participant Dashboard

This is an audio-only presentation.  There is no need to log in online.  If you would like to invite a guest to call in, please feel free to do so, but ask them to contact us to obtain the call-in number and a personal PIN. Requests for guest access must be received by 1:00 pm ET the day prior to the live session.

Not a member? Contact us at or fill out the form below to request guest access to this teleconference or join today


Non-Members are welcome to attend a webinar or teleconference as a guest at no cost and with no obligation to join.  After attending this session, we hope you will consider becoming a member.

Teleconferences & Webinars

Tuesday, October 3rd 
Noon ET (60 Minutes)
How to Give Powers to Trust Beneficiaries
Babetta von Albertini, ATM Capital Partners, LLC 

Tuesday, October 10th 
Noon ET (60 Minutes)
Managing Family Conflict Informed by Bowen Family Systems Theory
Mariana Martinez, Psy.D., Director of the Family Clinic at the Bowen Center for the Study of the Family

Tuesday, October 17th 
Noon ET (60 Minutes)
Gen Z: What is the Impact of a Generation Raised in a Digital World?
Lisa Niemeier, PPI Dean of Generational Impact

Tuesday, October 24th 
Noon ET (60 Minutes)
Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 1 of 2)
M. Lisa Shasteen, Esq., Shasteen & Percy, P.A.

Tuesday, October 31st 
Noon ET (60 Minutes)
Data: Security, Privacy & Liability (Part 2 of 2)
M. Lisa Shasteen, Esq., Shasteen & Percy, P.A.

Not a member?  Contact us to request guest access or join today!

Become a Member