This was quite good - mix of legal and outside expertise was effective.
VERY good.
Technical Questions?
512.475.6700
service@utcle.org
Data breaches are increasingly inevitable—and potentially devastating—to companies of all sizes.
The Essential Cybersecurity Law eConference is an extensive program designed to walk through key phases of breach preparedness and response. It provides detailed and practical guidance for implementing internal controls, developing an incident response plan, and responding to a data breach, as well as update on regulatory actions and class action litigation. Topics include:
- Top 10 Myths About Cybersecurity
- Internal Controls and Compliance
- HIPAA Breach Reporting
- Developing and Testing an Incident Response Plan
- Responding to a Data Breach
- Cybersecurity Insurance Policies
- Regulatory Actions and Civil Litigation Update
- The In-House Perspective: Latest Challenges and Solutions in Managing Cybersecurity
If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this online course is for you.
Includes: Video Audio Paper Slides
Preview Sessions
Show session details
Phong Tran, Gavin D. George
Download session materials for offline use
Session 1
—33 mins
Top 10 Myths About Cybersecurity (Sep 2016)
Cybersecurity is a realm that often conflates myth with reality, thereby obscuring certain threats and causing overreaction to others. A key to developing a sophisticated approach to cybersecurity is to dispel these fundamental myths that often cause organizations to incorrectly assess threats or misallocate resources.
Originally presented: Aug 2016 Essential Cybersecurity Law
Phong Tran,
Haynes and Boone LLP - Dallas, TX
Gavin D. George,
Haynes and Boone, LLP - Dallas, TX
Show session details
William R. Daugherty, John DeLozier
Download session materials for offline use
Session 2
—64 mins
Internal Controls and Compliance (Sep 2016)
This in-depth “how to” discusses implementing internal controls and ensuring compliance to prevent a breach or other cyber intrusion, including privacy surveys, privacy by design, and contracting with vendors.
Originally presented: Aug 2016 Essential Cybersecurity Law
William R. Daugherty,
BakerHostetler - Houston, TX
John DeLozier,
Mandiant - Dallas, TX
Show session details
Kristen B. Rosati
Download session materials for offline use
Session 3
—39 mins
HIPAA Breach Reporting (Sep 2016)
HIPAA's Breach Notification Rule requires notification of patients, the Office for Civil Rights, and sometimes the media, following a breach of unsecured protected health information. Through case studies, examine challenging issues in breach reporting.
Originally presented: Aug 2016 Essential Cybersecurity Law
Kristen B. Rosati,
Coppersmith Brockelman PLC - Phoenix, AZ
Show session details
Steven Bullitt
Download session materials for offline use
Session 4
—43 mins
Cybercrime: Catching the Bad Guys (Sep 2016)
Explore recent attacks and current cyber threats facing businesses, including the efforts federal law enforcement is undertaking to catch and prosecute these criminals, both domestic and foreign.
Originally presented: Aug 2016 Essential Cybersecurity Law
Steven Bullitt,
Vice President, Cyber Forensics and Investigations, NTT Security - Omaha, NE
Show session details
Emily Westridge Black
Download session materials for offline use
Session 5
—38 mins
Regulatory Actions and Civil Litigation Update (Sep 2016)
Examine emerging trends in regulatory enforcement actions and class action litigation arising from data breaches and cyber attacks.
Originally presented: Aug 2016 Essential Cybersecurity Law
Emily Westridge Black,
Haynes and Boone, LLP - Dallas, TX
Show session details
Bill Morrison, Rachel Ratcliff
Download session materials for offline use
Session 6
—65 mins
Developing and Testing an Incident Response Plan (Sep 2016)
When (not if) a data breach occurs, will you be ready to respond? Learn the most important steps to take, key considerations, and essential tools to use in developing your incident response plan.
Originally presented: Aug 2016 Essential Cybersecurity Law
Bill Morrison,
Tenet Healthcare Corporation - Dallas, TX
Rachel Ratcliff,
Stroz Friedberg - Dallas, TX
Show session details
Art Ehuan, Bart W. Huffman
Download session materials for offline use
Session 7
—39 mins
Responding to a Data Breach (Sep 2016)
Learn best practices for dealing with and responding to a cyber breach, including handling the investigation, notifications, remediation, coordination with law enforcement, public relations, and preparing for potential lawsuits.
Originally presented: Aug 2016 Essential Cybersecurity Law
Art Ehuan,
Alvarez & Marsal - Washington, DC
Bart W. Huffman,
Locke Lord LLP - Austin, TX
Show session details
Leslie C. Thorne, Bryan Perrault, Dominic Keller
Download session materials for offline use
Session 8
—33 mins
Cybersecurity Insurance Policies (Sep 2016)
Explore the possibility of securing insurance coverage under traditional general liability policies, as well as cyber insurance policies now available to cover cyber risks.
Originally presented: Aug 2016 Essential Cybersecurity Law
Leslie C. Thorne,
Haynes and Boone, LLP - Austin, TX
Bryan Perrault,
Willis Towers Watson - Austin, TX
Dominic Keller,
Willis Towers Watson - San Francisco, CA
Show session details
Ronald W. Breaux, Altresha Q. Burchett-Williams, Sarah Churchill Llamas, Doug Weiner
Download session materials for offline use
Session 9
—56 mins
The In-house Perspective: Latest Challenges and Solutions in Managing Cybersecurity (Sep 2016)
A panel of in-house counsel discuss the latest challenges and key considerations when confronting a cyber breach.
Originally presented: Aug 2016 Essential Cybersecurity Law
Ronald W. Breaux,
Haynes and Boone, LLP - Dallas, TX
Altresha Q. Burchett-Williams,
AT&T Services, Inc. - Dallas, TX
Sarah Churchill Llamas,
Sonic Healthcare USA - Austin, TX
Doug Weiner,
Hewlett Packard Enterprise - Austin, TX