eCourse art

eCourse

Taking Data Breach Responses to the Next Level

Contains material from Aug 2019

Taking Data Breach Responses to the Next Level
4.75 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

excellent

Technical Questions?
512.475.6700
service@utcle.org



Session 1: Taking Internal Controls and Compliance to the Next Level An in-depth discussion on implementing internal controls and ensuring compliance to prevent a breach or other cyber intrusion, as well was contracting with vendors and third-party vendor risk management.
 
Session 2: Ephemeral Data and Other Emerging Technology In cybersecurity, staying on pace with current technology, issues, and approaches is a step behind. Practitioners must remain ahead of what is current, or else they will find themselves obsolete, commoditized, outside best practice, or a victim of a cyber incident or crisis. Take a look ahead with thought leadership and awareness around emerging, nascent, or predicted cyber technologies, approaches, threats, challenges, and applications such as transactional due diligence, ephemeral data, incident response, smart cities, alternative commerce and banking, identification, contracting, connected devices, artificial intelligence, risk transfer, data analytics, ethical and privacy concerns, IoT, industrial controls, and connectivity.
 
Session 3: Data Breach Disclosure: Let’s Talk about it…or Not. A discussion about obligations to disclose data breach incidents and the best practices associated with such incidents.

Includes: Video Audio Paper Slides


Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions

Show session details

1. Taking Internal Controls and Compliance to the Next Level (Aug 2019)

Ryan T. Sulkin

1.00 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
56 mins
(mp3)
55 mins
(pdf)
20 pgs
Session 1 —56 mins
Taking Internal Controls and Compliance to the Next Level (Aug 2019)

An in-depth discussion on implementing internal controls and ensuring compliance to prevent a breach or other cyber intrusion, as well was contracting with vendors and third-party vendor risk management. 

Originally presented: Jul 2019 Essential Cybersecurity Law

Ryan T. Sulkin, Michael Best & Freidrich LLP - Chicago, IL

Show session details

2. Ephemeral Data and Other Emerging Technology (Aug 2019)

Jordan J. Herman, Chad M. Pinson

0.75 0.00 0.00
Preview Materials

Download session materials for offline use

(mp4)
47 mins
(mp3)
47 mins
Paper
(pdf)
7 pgs
Paper
(pdf)
4 pgs
Session 2 —47 mins
Ephemeral Data and Other Emerging Technology (Aug 2019)

In cybersecurity, staying on pace with current technology, issues, and approaches is a step behind. Practitioners must remain ahead of what is current, or else they will find themselves obsolete, commoditized, outside best practice, or a victim of a cyber incident or crisis. Take a look ahead with thought leadership and awareness around emerging, nascent, or predicted cyber technologies, approaches, threats, challenges, and applications such as transactional due diligence, ephemeral data, incident response, smart cities, alternative commerce and banking, identification, contracting, connected devices, artificial intelligence, risk transfer, data analytics, ethical and privacy concerns, IoT, industrial controls, and connectivity.

Originally presented: Jul 2019 Essential Cybersecurity Law

Jordan J. Herman, Baker Botts L.L.P. - Austin, TX
Chad M. Pinson, Stroz Friedberg - Dallas, TX

Show session details

3. Data Breach Disclosure: Let’s Talk about it…or Not.. (Aug 2019)

Monté L. Williams

0.75 0.50 0.00
Preview Materials

Download session materials for offline use

(mp4)
45 mins
(mp3)
45 mins
(pdf)
15 pgs
Session 3 —45 mins
Data Breach Disclosure: Let’s Talk about it…or Not.. (Aug 2019)

Discuss obligations to disclose data breach incidents and cover the best practices associated with such incidents.

Originally presented: Jul 2019 Essential Cybersecurity Law

Monté L. Williams, Steptoe & Johnson PLLC - Morgantown, WV