PPT-You’ve Suffered a Data Breach – Now What?

Author : faustina-dinatale | Published Date : 2017-12-14

Erik Rasmussen Managin g Director e rikrasmussenkrollcom July 12 2017 Proprietary and Confidential  Internal Use Only Agenda for this session Tabletop Exercises

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "You’ve Suffered a Data Breach – Now ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

You’ve Suffered a Data Breach – Now What?: Transcript


Erik Rasmussen Managin g Director e rikrasmussenkrollcom July 12 2017 Proprietary and Confidential  Internal Use Only Agenda for this session Tabletop Exercises Quick Review of IR Planning Principles. Cybersecurity. , and . Data Breach Issues in 2014. American Bar Association David Z. Bodenheimer. Litigation Section Program Crowell & Moring LLP. 2014 Spring Meeting Washington, DC. Scottsdale, AZ . Breach. Sheryl Falk. December . 10, 2013. Are you ready for a Data breach? . 2. Costs of Data Breach. 3. Q: What is a Data Breach? . 4. A Data breach is the intentional or unintentional release of. . Today’s Moderator. Bruce MacDougall . Senior Vice President . WGA. “If we do not act, we leave our nation vulnerable to protect the technologies that have unleashed untold opportunities for people around the globe.”. Breach. Sheryl Falk. December . 10, 2013. Are you ready for a Data breach? . 2. Costs of Data Breach. 3. Q: What is a Data Breach? . 4. A Data breach is the intentional or unintentional release of. . Team 4. Annamarie Filippone | Daniel Min | Mansi Paun | Sean Walsh | Shizhong Yang. AGENDA. What happened?. How did it happen?. What were the consequences?. How could it have been prevented?. TIMELINE. Recent U.S. Court Decisions, . Risk Management and Investigations. Jean M. Lawler and Jean M. Daly. Murchison & Cumming, LLP. Los Angeles, CA. www.murchisonlaw.com. Cyber and Data Breach Losses in the US -. Risk . Assessment . . 1. Risk Assessment and Breach Management . Privacy Officer Roles. Oversight. Compliance. Breach Management. 2. Governance. Compliance. Risk. Risk Assessment and Breach Management . Jeremy Gilbert, GCFE, GASF, . EnCE. , CPA. Agenda. Consumer ID theft issues. Data breach trends. Laws and regulations. Assessing and mitigating your risk. Consumer Identity Theft. Issues. Consumer ID Theft Statistics. B. reaches. Bill Cobb. The Art of Data Breach Response. “The enlightened ruler lays his plans well ahead; the good general cultivates his resources.”. Sun Tzu, The Art of War. The Art of Data Breach Response. Budgets, Breaches, and Back Again. Barbara Filkins. Senior SANS Analyst. © 2015 The SANS™ Institute – www.sans.org . Breaches, Breaches Everywhere…... 2015 has been called the “year of the breach”:. June 15, 2015. Clinton Mikel . is a Partner with The Health Law Partners, P.C. He is a graduate of Cornell University and the University of Michigan Law School. Mr. Mikel is the Chair of the American Bar Association, Health Law Section’s, eHealth, Privacy & Security Interest Group.. October, . 2014. Speaker Today. Jeff Sanchez . is a Managing Director in Protiviti’s Los Angeles office.  He joined Protiviti in 2002 after spending 10 years with Arthur Andersen’s Technology Risk Consulting practice.  . 2013 Target Data Breach Team 4 Annamarie Filippone | Daniel Min | Mansi Paun | Sean Walsh | Shizhong Yang AGENDA What happened? How did it happen? What were the consequences? How could it have been prevented? Where Does It Hurt? The Anatomy of a Data Breach wasp Fun Facts Recently married Not from Cincinnati originally Lived in Italy and China Red-green colorblind Biography Not-As-Fun Facts Not providing legal advice in this presentation

Download Document

Here is the link to download the presentation.
"You’ve Suffered a Data Breach – Now What?"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents