eCourse art

eCourse

Protecting, Detecting, and Responding to a Data Breach: Updates

Contains material from Aug 2018

Protecting, Detecting, and Responding to a Data Breach: Updates
4.08 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

Technical Questions?
512.475.6700
service@utcle.org



Session 1: Internal Controls and Compliance - Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.

Session 2: Incident Response and Breach Disclosure Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.

Session 3: Third-Party Vendor Risk Management - Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators.

Includes: Video Audio Slides


Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions

Show session details

1. Internal Controls and Compliance (Aug 2018)

Shawn A. Morgan, Monté L. Williams

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
61 mins
(mp3)
61 mins
(pdf)
33 pgs
Session 1 —61 mins
Internal Controls and Compliance (Aug 2018)

Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.

Originally presented: Jul 2018 Essential Cybersecurity Law

Shawn A. Morgan, Steptoe & Johnson PLLC - Bridgeport, WV
Monté L. Williams, Steptoe & Johnson PLLC - Morgantown, WV

Show session details

2. Incident Response and Breach Disclosure (Aug 2018)

Lynn Sessions, Thomas Arnold, Nick Bludworth, William R. Daugherty

1.25 0.50 0.00
Preview Materials

Download session materials for offline use

(mp4)
80 mins
(mp3)
79 mins
(pdf)
10 pgs
Session 2 —80 mins
Incident Response and Breach Disclosure (Aug 2018)

Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.

Originally presented: Jul 2018 Essential Cybersecurity Law

Lynn Sessions, Baker & Hostetler LLP - Houston, TX
Thomas Arnold, Mandiant - Houston, TX
Nick Bludworth, Federal Bureau of Investigation - Houston, TX
William R. Daugherty, Baker & Hostetler LLP - Houston, TX

Show session details

3. Third-Party Vendor Risk Management (Aug 2018)

Elizabeth C. Rogers

0.50 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
37 mins
(mp3)
37 mins
(pdf)
17 pgs
Session 3 —37 mins
Third-Party Vendor Risk Management (Aug 2018)

Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators.

Originally presented: Jul 2018 Essential Cybersecurity Law

Elizabeth C. Rogers, Michael Best & Friedrich LLP - Austin, TX