eCourse
Protecting, Detecting, and Responding to a Data Breach: Updates
Contains material from Aug 2018
Technical Questions?
512.475.6700
service@utcle.org
Session 2: Incident Response and Breach Disclosure - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.
Session 3: Third-Party Vendor Risk Management - Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators.
Includes: Video Audio Slides
Preview Sessions
Show session details
Shawn A. Morgan, Monté L. Williams
Download session materials for offline use
Session 1
—61 mins
Internal Controls and Compliance (Aug 2018)
Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.
Originally presented: Jul 2018 Essential Cybersecurity Law
Shawn A. Morgan,
Steptoe & Johnson PLLC - Bridgeport, WV
Monté L. Williams,
Steptoe & Johnson PLLC - Morgantown, WV
Show session details
Lynn Sessions, Thomas Arnold, Nick Bludworth, William R. Daugherty
Download session materials for offline use
Session 2
—80 mins
Incident Response and Breach Disclosure (Aug 2018)
Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.
Originally presented: Jul 2018 Essential Cybersecurity Law
Lynn Sessions,
Baker & Hostetler LLP - Houston, TX
Thomas Arnold,
Mandiant - Houston, TX
Nick Bludworth,
Federal Bureau of Investigation - Houston, TX
William R. Daugherty,
Baker & Hostetler LLP - Houston, TX
Show session details
Elizabeth C. Rogers
Download session materials for offline use
Session 3
—37 mins
Third-Party Vendor Risk Management (Aug 2018)
Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators.
Originally presented: Jul 2018 Essential Cybersecurity Law
Elizabeth C. Rogers,
Michael Best & Friedrich LLP - Austin, TX