Data Security Breach Response (OnDemand Webinar)

$149.00

SKU: 410705EAU

Description

Know how to execute your own security breach response plan and how to minimize your company’s risk.In 2012, then Director of the FBI Robert S. Mueller III announced, ‘There are only two types of companies Those that have been hacked and those that will be hacked.’ Several years later, Cisco CEO John Chambers remarked that a more accurate statement may be ‘There are only two types of companies Those that have been hacked and those that don’t know they have been hacked.’ Executives are increasingly accepting the notion of not if but when their companies will fall victim to some type of cyberattack or malicious intrusion upon their systems. Companies must act decisively and effectively to protect their customers and themselves from the potentially devastating impact of data breaches. This course will educate companies and their counsel on the legal and practical ramifications of a data breach. Receive an overview of incident response and breach notification obligations under applicable law. Longerterm effects will be considered, including impact on brand and reputation, with lessons learned from highprofile incidents. The material then examines how cybersecurity has evolved from an IT issue to a regular agenda item in many of the boardrooms of America, particularly in the face of regulatory review of corporate responses to breaches. There will also be a discussion on strategies to create a security culture within your organization and implement administrative, technical, and physical security measures to manage risk.

Date: 2023-03-13 Start Time: End Time:

Learning Objectives

Incident Response
• Reporting Protocols Within Organization and Externally to Advisors, Customers, Law Enforcement, and Federal and State Agencies
• Compliance With Breach Notification Requirements
• Critical Infrastructure and Reporting Obligations
• Brand Reputation Management

Cybersecurity as Corporate Governance Issue
• Agenda Item for the Boardroom
• Obligations of Corporate Directors
• Cost-Benefit Analysis Considerations (Making Sense of Cents)

Regulatory Perspectives on Breach Responses
• OFAC Restrictions and Sanctions on Ransom Payments
• SEC Reporting Obligations
• Critical Infrastructure Reporting Obligations
• FTC Decisions and Consent Decrees

Notable State Statutory Trends and Decisions

Strategies for Cyber-Preparedness
• Proactive Legislation • No Longer Just Sectoral
• Management Initiatives
• Employee Training Protocols
• Risk Mitigation Techniques
• Information Security Program
• Business Impact Analysis
• Business Continuity Plan
• Disaster Recovery Plan
• Backup Plan
• Written Data Breach Response Plan

CLE (Please check the Detailed Credit Information page for states that have already been approved) ,NALA ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Michelle A. Schaap, Esq.-Chiesa, Shahinian & Giantomasi PC, Frank Xavier Wukovits – Chiesa, Shahinian & Giantomasi PC

Data Security Breach Response (OnDemand Webinar)

$149.00

SKU: 409944EAU

Description

Know how to execute your own security breach response plan and how to minimize your company’s risk.In 2012, then Director of the FBI Robert S. Mueller III announced, ‘There are only two types of companies Those that have been hacked and those that will be hacked.’ Several years later, Cisco CEO John Chambers remarked that a more accurate statement may be ‘There are only two types of companies Those that have been hacked and those that don’t know they have been hacked.’ Executives are increasingly accepting the notion of not if but when their companies will fall victim to some type of cyberattack or malicious intrusion upon their systems. Companies must act decisively and effectively to protect their customers and themselves from the potentially devastating impact of data breaches. This course will educate companies and their counsel on the legal and practical ramifications of a data breach. Receive an overview of incident response and breach notification obligations under applicable law. Longerterm effects will be considered, including impact on brand and reputation, with lessons learned from highprofile incidents. The material then examines how cybersecurity has evolved from an IT issue to a regular agenda item in many of the boardrooms of America, particularly in the face of regulatory review of corporate responses to breaches. There will also be a discussion on strategies to create a security culture within your organization and implement administrative, technical and physical security measures to manage risk.

Date: 2022-07-26 Start Time: End Time:

Learning Objectives

Incident Response
• Reporting Protocols Within Organization and Externally to Advisors, Customers, Law Enforcement, and Federal and State Agencies
• Compliance With Breach Notification Requirements
• Critical Infrastructure and Reporting Obligations
• Brand Reputation Management

Cybersecurity as Corporate Governance Issue
• Agenda Item for the Boardroom
• Obligations of Corporate Directors
• Cost-Benefit Analysis Considerations (Making Sense of Cents)

Regulatory Perspectives on Breach Responses
• OFAC Restrictions and Sanctions on Ransom Payments
• SEC Reporting Obligations
• Critical Infrastructure Reporting Obligations
• FTC Decisions and Consent Decrees

Notable State Statutory Trends and Decisions

Strategies for Cyber-Preparedness
• Proactive Legislation • No Longer Just Sectoral
• Management Initiatives
• Employee Training Protocols
• Risk Mitigation Techniques
• Information Security Program
• Business Impact Analysis
• Business Continuity Plan
• Disaster Recovery Plan
• Backup Plan
• Written Data Breach Response Plan

CLE (Please check the Detailed Credit Information page for states that have already been approved) ,NALA ,Additional credit may be available upon request. Contact Lorman at 866-352-9540 for further information.

Michelle A. Schaap, Esq.-Chiesa, Shahinian & Giantomasi PC, Frank Xavier Wukovits – Chiesa, Shahinian & Giantomasi PC