eCourse art

eCourse

Essential Cybersecurity Preparedness and Response: Internal Controls, Developing an Incident Response Plan and Responding to a Data Breach.

Contains material from Sep 2016

Essential Cybersecurity Preparedness and Response: Internal Controls, Developing an Incident Response Plan and Responding to a Data Breach.
4.12 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

Good topical CLE

Technical Questions?
512.475.6700
service@utcle.org



Session 1: Internal Controls and Compliance - This in-depth “how to” discusses implementing internal controls and ensuring compliance to prevent a breach or other cyber intrusion, including privacy surveys, privacy by design, and contracting with vendors.

Session 2: Developing and Testing an Incident Response Plan - When (not if) a data breach occurs, will you be ready to respond? Learn the most important steps to take, key considerations, and essential tools to use in developing your incident response plan.

Session 3: Responding to a Data Breach - Learn best practices for dealing with and responding to a cyber breach, including handling the investigation, notifications, remediation, coordination with law enforcement, public relations, and preparing for potential lawsuits.

Includes: Video Audio Paper Slides


Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions

Show session details

1. Internal Controls and Compliance (Sep 2016)

William R. Daugherty, John DeLozier

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
64 mins
(mp3)
64 mins
(pdf)
16 pgs
(pdf)
18 pgs
Session 1 —64 mins
Internal Controls and Compliance (Sep 2016)

This in-depth “how to” discusses implementing internal controls and ensuring compliance to prevent a breach or other cyber intrusion, including privacy surveys, privacy by design, and contracting with vendors.

Originally presented: Aug 2016 Essential Cybersecurity Law

William R. Daugherty, BakerHostetler - Houston, TX
John DeLozier, Mandiant - Dallas, TX

Show session details

2. Developing and Testing an Incident Response Plan (Sep 2016)

Bill Morrison, Rachel Ratcliff

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
65 mins
(mp3)
64 mins
(pdf)
20 pgs
Session 2 —65 mins
Developing and Testing an Incident Response Plan (Sep 2016)

When (not if) a data breach occurs, will you be ready to respond? Learn the most important steps to take, key considerations, and essential tools to use in developing your incident response plan.

Originally presented: Aug 2016 Essential Cybersecurity Law

Bill Morrison, Tenet Healthcare Corporation - Dallas, TX
Rachel Ratcliff, Stroz Friedberg - Dallas, TX

Show session details

3. Responding to a Data Breach (Sep 2016)

Art Ehuan, Bart W. Huffman

0.75 0.25 0.00
Preview Materials

Download session materials for offline use

(mp4)
39 mins
(mp3)
39 mins
(pdf)
4 pgs
(pdf)
9 pgs
Session 3 —39 mins
Responding to a Data Breach (Sep 2016)

Learn best practices for dealing with and responding to a cyber breach, including handling the investigation, notifications, remediation, coordination with law enforcement, public relations, and preparing for potential lawsuits.

Originally presented: Aug 2016 Essential Cybersecurity Law

Art Ehuan, Alvarez & Marsal - Washington, DC
Bart W. Huffman, Locke Lord LLP - Austin, TX