eConference

2016 Essential Cybersecurity Law eConference

Contains material from Sep 2016

2016 Essential Cybersecurity Law eConference
4.03 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

This was quite good - mix of legal and outside expertise was effective.

VERY good.

Technical Questions?
512.475.6700
service@utcle.org



Data breaches are increasingly inevitable—and potentially devastating—to companies of all sizes.

The Essential Cybersecurity Law eConference is an extensive program designed to walk through key phases of breach preparedness and response. It provides detailed and practical guidance for implementing internal controls, developing an incident response plan, and responding to a data breach, as well as update on regulatory actions and class action litigation. Topics include:

  • Top 10 Myths About Cybersecurity
  • Internal Controls and Compliance
  • HIPAA Breach Reporting
  • Developing and Testing an Incident Response Plan
  • Responding to a Data Breach
  • Cybersecurity Insurance Policies
  • Regulatory Actions and Civil Litigation Update
  • The In-House Perspective: Latest Challenges and Solutions in Managing Cybersecurity

If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this online course is for you.

Includes: Video Audio Paper Slides


Preview mode. You must be signed in, have purchased this eConference, and the eConference must be active to have full access.
Preview Sessions

Show session details

1. Top 10 Myths About Cybersecurity (Sep 2016)

Phong Tran, Gavin D. George

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
33 mins
(mp3)
33 mins
(pdf)
4 pgs
(pdf)
4 pgs
(pdf)
7 pgs
Session 1 —33 mins
Top 10 Myths About Cybersecurity (Sep 2016)

Cybersecurity is a realm that often conflates myth with reality, thereby obscuring certain threats and causing overreaction to others.  A key to developing a sophisticated approach to cybersecurity is to dispel these fundamental myths that often cause organizations to incorrectly assess threats or misallocate resources.

Originally presented: Aug 2016 Essential Cybersecurity Law

Phong Tran, Haynes and Boone LLP - Dallas, TX
Gavin D. George, Haynes and Boone, LLP - Dallas, TX

Show session details

2. Internal Controls and Compliance (Sep 2016)

William R. Daugherty, John DeLozier

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
64 mins
(mp3)
64 mins
(pdf)
16 pgs
(pdf)
18 pgs
Session 2 —64 mins
Internal Controls and Compliance (Sep 2016)

This in-depth “how to” discusses implementing internal controls and ensuring compliance to prevent a breach or other cyber intrusion, including privacy surveys, privacy by design, and contracting with vendors.

Originally presented: Aug 2016 Essential Cybersecurity Law

William R. Daugherty, BakerHostetler - Houston, TX
John DeLozier, Mandiant - Dallas, TX

Show session details

3. HIPAA Breach Reporting (Sep 2016)

Kristen B. Rosati

0.75 0.25 0.00
Preview Materials

Download session materials for offline use

(mp4)
39 mins
(mp3)
39 mins
(pdf)
15 pgs
(pdf)
11 pgs
Session 3 —39 mins
HIPAA Breach Reporting (Sep 2016)

HIPAA's Breach Notification Rule requires notification of patients, the Office for Civil Rights, and sometimes the media, following a breach of unsecured protected health information. Through case studies, examine challenging issues in breach reporting. 

Originally presented: Aug 2016 Essential Cybersecurity Law

Kristen B. Rosati, Coppersmith Brockelman PLC - Phoenix, AZ

Show session details

4. Cybercrime: Catching the Bad Guys (Sep 2016)

Steven Bullitt

0.75 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
43 mins
(mp3)
43 mins
Session 4 —43 mins
Cybercrime: Catching the Bad Guys (Sep 2016)

Explore recent attacks and current cyber threats facing businesses, including the efforts federal law enforcement is undertaking to catch and prosecute these criminals, both domestic and foreign.

Originally presented: Aug 2016 Essential Cybersecurity Law

Steven Bullitt, Vice President, Cyber Forensics and Investigations, NTT Security - Omaha, NE

Show session details

5. Regulatory Actions and Civil Litigation Update (Sep 2016)

Emily Westridge Black

0.75 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
38 mins
(mp3)
38 mins
(pdf)
8 pgs
Session 5 —38 mins
Regulatory Actions and Civil Litigation Update (Sep 2016)

Examine emerging trends in regulatory enforcement actions and class action litigation arising from data breaches and cyber attacks.

Originally presented: Aug 2016 Essential Cybersecurity Law

Emily Westridge Black, Haynes and Boone, LLP - Dallas, TX

Show session details

6. Developing and Testing an Incident Response Plan (Sep 2016)

Bill Morrison, Rachel Ratcliff

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
65 mins
(mp3)
64 mins
(pdf)
20 pgs
Session 6 —65 mins
Developing and Testing an Incident Response Plan (Sep 2016)

When (not if) a data breach occurs, will you be ready to respond? Learn the most important steps to take, key considerations, and essential tools to use in developing your incident response plan.

Originally presented: Aug 2016 Essential Cybersecurity Law

Bill Morrison, Tenet Healthcare Corporation - Dallas, TX
Rachel Ratcliff, Stroz Friedberg - Dallas, TX

Show session details

7. Responding to a Data Breach (Sep 2016)

Art Ehuan, Bart W. Huffman

0.75 0.25 0.00
Preview Materials

Download session materials for offline use

(mp4)
39 mins
(mp3)
39 mins
(pdf)
4 pgs
(pdf)
9 pgs
Session 7 —39 mins
Responding to a Data Breach (Sep 2016)

Learn best practices for dealing with and responding to a cyber breach, including handling the investigation, notifications, remediation, coordination with law enforcement, public relations, and preparing for potential lawsuits.

Originally presented: Aug 2016 Essential Cybersecurity Law

Art Ehuan, Alvarez & Marsal - Washington, DC
Bart W. Huffman, Locke Lord LLP - Austin, TX

Show session details

8. Cybersecurity Insurance Policies (Sep 2016)

Leslie C. Thorne, Bryan Perrault, Dominic Keller

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
33 mins
(mp3)
33 mins
(pdf)
9 pgs
Session 8 —33 mins
Cybersecurity Insurance Policies (Sep 2016)

Explore the possibility of securing insurance coverage under traditional general liability policies, as well as cyber insurance policies now available to cover cyber risks.

Originally presented: Aug 2016 Essential Cybersecurity Law

Leslie C. Thorne, Haynes and Boone, LLP - Austin, TX
Bryan Perrault, Willis Towers Watson - Austin, TX
Dominic Keller, Willis Towers Watson - San Francisco, CA

Show session details

9. The In-house Perspective: Latest Challenges and Solutions in Managing Cybersecurity (Sep 2016)

Ronald W. Breaux, Altresha Q. Burchett-Williams, Sarah Churchill Llamas, Doug Weiner

1.00 0.50 0.00
Preview Materials

Download session materials for offline use

(mp4)
56 mins
(mp3)
56 mins
(pdf)
7 pgs
Session 9 —56 mins
The In-house Perspective: Latest Challenges and Solutions in Managing Cybersecurity (Sep 2016)

A panel of in-house counsel discuss the latest challenges and key considerations when confronting a cyber breach.

Originally presented: Aug 2016 Essential Cybersecurity Law

Ronald W. Breaux, Haynes and Boone, LLP - Dallas, TX
Altresha Q. Burchett-Williams, AT&T Services, Inc. - Dallas, TX
Sarah Churchill Llamas, Sonic Healthcare USA - Austin, TX
Doug Weiner, Hewlett Packard Enterprise - Austin, TX