Ransomware in AEC: Industry Realities and Management Best Practices
Sponsored by the Northern California Chapter, NECA Member Services Committee
Date: Tuesday, April 28, 2026
Time: 12:00 PM – 1:30 PM
HYBRID MEETING: Zoom Conference or NorCal NECA Office (7041 Koll Center Parkway, Suite 100, Pleasanton)
Cost: Free to NECA Members working on NorCal NECA’s jurisdiction
Speaker: Kevin Soohoo (Head of Global AEC Practice at Egnyte) is dedicated to helping firms turn years of unstructured project documents into their most powerful asset. With over 20 years of experience, including a tenure as an IT and Innovation Leader for a top ranked contractor, Kevin bridges the gap between complex data governance and real-world construction workflows.
Course Description: A few years ago, ransomware was an “IT problem.” Today, it is a significant business and project risk impacting every level of the firm – from the jobsite to the leadership team. This session moves beyond technical jargon to focus on the real-world experiences of AEC (Architecture Engineering & Construction) firms that have navigated these crises and the practical management strategies they adopted.
We will explore the human and operational realities of modern breaches, focusing on how industry peers balance open collaboration with data protection. Learn why a firm’s ‘culture of security’ is often more critical to project continuity than its software.
Learning Objectives:
- The Human Factor: How to move beyond basic training to create an environment where automated safeguards catch the human errors that lead to breaches.
- Visibility as Defense: Why knowing exactly where your sensitive project data lives – and who has access to it – is the first step in reducing your attack surface.
- Rapid Recovery & Continuity: Strategies for shifting from “legacy backups” to near-instantaneous recovery to keep project teams working during an incident.
- Secure Collaboration: Best practices for sharing large BIM files and sensitive bid data with external partners without losing ownership or control.
- The Compliance Shift: How to meet the increasingly rigid security requirements of project owners and cyber-insurers through automated reporting and governance.
Targe Audience: Anyone who touches a computer, laptop, tablet or smartphone
Note: Classes are subject to cancellation two weeks in advance, in the event sufficient registration is not received.
Contact Juanita Mitchell at the Chapter office (925) 828-6322, should you have any questions.