<img width="1600" height="900" data-tf-not-load src="https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?fit=1600%2C900&ssl=1" class="attachment-full size-full wp-post-image" alt="CYBER CON, featuring Reema Moussa, Allyson McReynolds, Grant Versfeld, Lama Mohammed" decoding="async" srcset="https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?w=1600&ssl=1 1600w, https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?resize=300%2C169&ssl=1 300w, https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?resize=1024%2C576&ssl=1 1024w, https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?resize=768%2C432&ssl=1 768w, https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?resize=1536%2C864&ssl=1 1536w" sizes="(max-width: 1600px) 100vw, 1600px" data-attachment-id="15646" data-permalink="https://www.ilpfoundry.us/podcast/cybersecurity-risk-mitigation-and-prevention-a-very-merry-cyber-con-recap-episode-24/image-3-3/" data-orig-file="https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?fit=1600%2C900&ssl=1" data-orig-size="1600,900" data-comments-opened="1" data-image-meta="{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0"}" data-image-title="image (3)" data-image-description="" data-image-caption="" data-medium-file="https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?fit=300%2C169&ssl=1" data-large-file="https://i0.wp.com/www.ilpfoundry.us/wp-content/uploads/2022/11/image-3.png?fit=1024%2C576&ssl=1" />
Foundry Fellows Reema Moussa, Allyson McReynolds, Grant Versfeld & Lama Mohammed discuss highlights from the Foundry's first ever virtual cybersecurity convention, CYBER CON, starring Amie D'souza, Josephine Wolff, Kassi Burns, Eva Galperin and Siena Anstis. They chat about the event's key theme; cybersecurity risk mitigation in law and policy, as well as particular practices around of cyber insurance, cyber hygiene for lawyers, and spyware.