Faculty

Summit

Lisa J. Sotto

Partner and Chair of the Global Privacy and Cybersecurity Practice
Hunton Andrews Kurth LLP

Biography

Lisa chairs Hunton’s top-ranked Global Privacy and Cybersecurity practice. Well-recognized in the field of privacy and cybersecurity, Lisa was named to The National Law Journal’s “The 100 Most Influential Lawyers in America” list. Chambers and Partners rated Hunton as a “Star Individual” for privacy and data security in its Chambers Global and Chambers USA guides, and The Legal 500 United States guide ranked the firm in “Tier 1” for cyber crime and privacy and data security. She was profiled as “The Queen of Breach” by Super Lawyers. Lisa also is a principal of the Centre for Information Policy Leadership at Hunton, a privacy think tank associated with the law firm, augments our privacy practice. The Centre provides strategic leadership and consulting on all aspects of global information policy, privacy and security. The Centre is led by internationally-recognized privacy and data security lawyers and professionals, with active participation by more than 70 leading multinational corporations.

Company

With over 900 lawyers in the United States, Asia, Europe and the Middle East, Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. We are known for our strength in the energy, financial services, real estate, and retail and consumer products industries, as well as our considerable experience in more than 100 distinct areas of practice, including privacy and cybersecurity, intellectual property, environment, and mergers and acquisitions. Our full-service litigation practice is one of the largest in the country, with particular depth in key litigation markets such as Texas, California, Florida and the Mid-Atlantic.

Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Future Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

Future Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Serverless: Accelerating Development for Data-Intensive Workloads