SlideShare uma empresa Scribd logo
1 de 47
2
Practical and entertaining education for
attorneys, accountants, business owners and
executives, and investors.
Disclaimer
The material in this webinar is for informational purposes only. It should not be considered
legal, financial or other professional advice. You should consult with an attorney or other
appropriate professional to determine what may be best for your individual needs. While
Financial Poise™ takes reasonable steps to ensure that information it publishes is accurate,
Financial Poise™ makes no guaranty in this regard.
3
Meet the Faculty
MODERATOR:
Kathryn Nadro – Sugar, Felsenthal, Grais & Helsinger LLP
PANELISTS:
J. Eduardo Campos – Embedded-Knowledge, Inc.
Anna Mercado Clark – Phillips Lytle LLP
Cassandra Porter – Zuora
5
About This Webinar-Data Breach Response: Before and
After the Breach
You’ve received the dreaded call that your company has just suffered a data breach – what do you do
next? Who do you call for help? What notification obligations do you have?
With proper preparation, you can mitigate the damage caused by this unfortunate event and put your
business in a position to recover. Your company may have already implemented its information security
program and identified the responsible parties, including applicable outside experts, to be contacted in
the event of a breach. However, now you must call up your incident response team to investigate the
extent of the breach, evaluate the possible damage to your company, and determine whether you must
notify your clients, customers, or the public of the breach. This webinar will help prepare you to take
action when the worst happens.
6
About This Series
Cyber Security & Data Privacy 2021
Cybersecurity and data privacy are critical topics of concern for every business in today’s
environment. Data breaches are a threat to every business and can cause both direct losses
from business interruption and loss of data to indirect losses from unwanted publicity and
damage to your business’s reputation. Compliance with a patchwork of potentially applicable
state and federal laws and regulations may cost your business in terms of money and time.
This series discusses the various laws and regulations that affect businesses in the United
States and in Europe, as well as the best practices to use in creating an information security
program and preparing for and responding to data breaches.
Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and
executives without much background in these areas, yet is of primary value to attorneys, accountants, and other
seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to
entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that
participants will enhance their knowledge of this area whether they attend one, some, or all episodes.
7
Episodes in this Series
#1 Introduction to US Privacy and Data Security: Regulations and Requirements
Premiere date: 08/04/21
#2: Introduction to EU General Data Protection Regulation: Planning, Implementation, and
Compliance
Premiere date: 9/01/21
#3: How to Build and Implement your Company's Information Security Program
Premiere date: 10/06/21
#4: Data Breach Response: Before and After the Breach
Premiere date: 11/03/21
8
Episode #4: Data Breach Response: Before and After
the Breach
9
Overview
• What is a Data Breach?
✓ Simply put, a data breach is a confirmed incident in which sensitive, confidential or
otherwise protected data has been accessed and/or disclosed in an unauthorized
fashion
✓ Data breach may have different meanings under various state, federal, and
international laws
• Data Breach Consequences
✓ Substantial costs in breach response
✓ Private lawsuits
✓ Government fines
✓ Reputational harm
Overview
• Data Breach Facts (IBM Cost of a Data Breach Report 2021)
✓ Per Record with Personally Identifiable Information: approximately $180
✓ 10% increase in average total cost of a breach from 2020 to 2021
✓ $4.62 million average total cost of a ransomware breach
✓ $4.24 million global average total cost of a data breach
• Average Data Breach Costs According to Each Industry
✓ Healthcare: $9.23 million
✓ Financial: $5.72 million
✓ Communications: $3.62 million
✓ Industrial: $4.24 million
Overview
• Data Breach Costs (cont’d)
✓ A few costs include -
▪ Computer forensics
▪ Breach notification mailing, call centering and identity restoration services costs
▪ Public relations
▪ Regulatory investigation, fines and penalties
▪ Lawsuit(s)
▪ Legal services
• Average number of days to identify and contain a breach: 287 days
Overview
• Data Breach Causes
✓ Malware/Ransomware
✓ Unsecured website login systems
✓ Use of unapproved, insecure software
✓ Insecure IT infrastructure
✓ Phishing/e-mail scam
✓ Employees mishandling data
✓ Human factor/negligence
Overview
• Data Breach Goals
✓ Money
✓ Theft of personal information
▪ Purchase of goods with stolen credit card information
✓ Filing of fraudulent tax returns
✓ Sale of personal information
✓ Disgruntled employee(s) use of information
✓ Corporate espionage
So, You Think You’ve Been Breached…
• Know who to call
✓ Incident Response Team
✓ Management
✓ Legal counsel
✓ IT support
✓ Public relations
✓ Forensic support
✓ Insurance
✓ Consider contractual obligations
So, You Think You’ve Been Breached… (cont’d)
• Breach Response
✓ Identify
▪ Determine if a breach actually occurred
✓ Investigate
▪ How did the breach occur?
✓ Contain
▪ Contain and mitigate the data breach
✓ Notify
▪ Provide notifications
✓ Remediate
▪ Prevent reoccurrence of breach
Breach Response: Identify/Detect
• First, identify if an incident is a data breach
✓ Employees may have exposed sensitive personal data by accident;
✓ Common indicators of compromise include –
o unusual login times
o reduced operating speeds across the network or heavy, unexplained traffic
o use of nonstandard command prompts
o unexpected restarts
o use of unusual software
o malfunctioning of antivirus/security software
o the presence of unexpected IPs
Breach Response: Identify/Detect (cont’d)
• Identify if an incident is a data breach (cont’d)
✓ Security monitoring systems (cont’d)
▪ Top Cyber Threat Vulnerabilities
o Phishing
o Malware
o Ransomware
o Data Breaches
o Compromised passwords
▪ Conduct Cyber Threat Assessments
o A good cyber threat assessment offers security and threat prevention by
exposing application vulnerabilities;
o detecting malware and botnets;
o identifying “at risk” devices
Breach Response: Identify/Detect (cont’d)
• Second, investigate promptly
✓ Consider relevant facts
✓ Inside or outside threat?
✓ Conduct interviews
✓ Analyze compromised systems
✓ Identify malware employed, if applicable
✓ Engage forensic experts, as appropriate
✓ Engage legal counsel early in the process
✓ Reconstruct the incident
Breach Response: Identify/Detect (cont’d)
• Second, investigate promptly (Cont’d)
✓ Evaluate the nature, extent, and scope of incident
✓ What information was improperly disclosed?
✓ Was the information recovered?
✓ When and how did the incident happen?
✓ How many individuals were affected?
✓ Does the incident involve residents of multiple states?
✓ Document the investigation findings, conclusion and rationale
Breach Response: Containment
• Third, once you discover you’ve been breached, contain the breach
• Move quickly to secure systems and fix vulnerabilities
• Mobilize breach response team ASAP
• Assemble a team of experts based on the size of your company, including:
✓ Forensics
✓ Legal
✓ Internal team leader
Breach Response: Containment
• The First 24 Hours Checklist
✓ Record the date and time when the breach was discovered & response efforts begin
✓ Alert and activate everyone on the response team
✓ Secure the premises around the area where the data breach occurred to help
preserve evidence
Breach Response: Containment
• The First 24 Hours Checklist (Cont’d)
✓ Stop additional data loss
▪ Take devices offline but DO NOT turn off
✓ Assess priorities and risks
✓ Notify customers, affected businesses, law enforcement and other regulatory
agencies
Breach Response: Fix Vulnerabilities
• Service providers
✓ Ensure service providers that have access to sensitive personal data remedy their
vulnerabilities to protect against another breach
• Network segmentation
✓ Prevents breach on one server from leaking over to another server
✓ Determine if network segmentation is correct
Breach Response: Fix Vulnerabilities
• Work with forensic experts
✓ Encryption enabled
✓ Analyze backup or preserved data
✓ Review the type of information compromised
• Develop a communication plan
✓ Develop comprehensive plan to communicate internally
Breach Response: Breach Team
• Forensics Team - helps determine the source and scope of breach
✓ Captures forensic images of affected systems
✓ Collects and analyze evidence, and
✓ Outlines remediation steps
• Hire independent forensics investigators
Breach Response: Breach Team
• Legal Counsel - helps identify your legal obligations
✓ Identifies state and federal regulations regarding data breaches for your industry
✓ Identifies entities that need to be notified, i.e. customers, employees, government
agencies, regulation boards, etc.
✓ May provide privilege to the investigation process if retained early enough and if
directs forensic investigation
❑ Certain courts have refused to apply privilege to investigation even under
those circumstances
✓ Ensures notifications occur within any mandated timeframes
Breach Response: Notice
• Fourth, determine your notification obligations
• Potential parties to notify:
✓ Customers
✓ Law enforcement and other regulatory agencies
✓ Affected businesses
Breach Response: Notice (cont’d)
• Notification requirements vary based on state, federal, and international law
✓ All 50 U.S. states require some level of notification to individuals when a breach
occurs
✓ If breaches reach a certain size (e.g., over 500 individuals), many states require
notification to attorneys general
✓ Notification generally must occur within a “reasonable time” after the breach is
discovered
✓ Generally, must include description of the circumstances of the breach,
steps taken to remedy the incident, steps intended to be taken after the
notification, and occasionally whether law enforcement is involved in
investigating the incident
✓ International law may be stricter than your specific state
✓ GDPR requires notice in 72 hours in some cases
Breach Response: Notice…to the FBI?
• Consider contacting the FBI and/or local authorities when a breach involves:
o Significant loss in data, system availability, or control of systems
o A large number of victims
o Unauthorized access to or malicious software on critical information technology
systems
o Critical infrastructure or core government functions
o National security, economic security, or public health and safety
o Financial transactions, such as unauthorized wire transfers
Breach Response: Remediation
• Fifth, remediate the data breach
• Generally long and thorough and requires looking at other potential flaws in security
infrastructure
• Develop a remediation plan that is tailored to the breach incident to prevent it from
happening again
✓ Honest & true assessment of cause of breach
Breach Response: Remediation (cont’d)
• A few remediation practices include -
✓ Developing an internal and external communications plan
✓ Strengthen data security policies
✓ Planning to prevent reoccurrence
✓ Providing additional training to employees on data security
✓ Maintaining documentation of actions
✓ Insurance considerations
Prevention is Better than Remediation: Data Breach
Response Plan
• What is a data breach response plan?
✓ Aims to help you manage a data breach
✓ Provides a framework that sets out roles and responsibilities for managing an
appropriate response to data breach
✓ Describes steps an entity should take to manage a breach, should one occur
• Why do you need a data breach response plan?
✓ Provides clarity and mitigates confusion
✓ Gives all employees knowledge of how to address a data breach
✓ Establishes a chain of command and responsibilities of each employee
✓ Quicker response time to fixing the breach
Data Breach Response Plan
• A data breach response plan should:
✓ Provide the actions to be taken if a breach is suspected, discovered or reported by a
staff member, including when it is to be escalated to the response team
✓ Identify members of your data breach response team (response team)
✓ Identify the actions the response team is expected to take
✓ Be in writing
▪ Staff and employees could clearly understand the roles and responsibilities
✓ Identify goals and objectives of the plan
Data Breach Response Plan
• Data breach response plan should cover:
✓ A strategy for assessing, managing and containing data breaches
✓ A clear explanation of what constitutes a data breach
✓ The reporting line if staff do suspect a data breach
✓ The circumstances in which the breach can be handled by a line manager or when it
should be escalated to the response team
✓ Recording data breaches
✓ A strategy to identify and address any weaknesses in data handling that contributed
to the breach
✓ A system for a post-breach review and assessment of your entity’s response to the
data breach and the effectiveness of your data breach response plan
✓
Breach Response: Remediation
• Insurance Considerations
✓ Traditional policies
E&O
D&O
▪ CGL
✓ These policies frequently do not cover costs arising out of a security incident or data
breach
Breach Response: Remediation (cont’d)
• Insurance Considerations (Cont’d)
✓ 1st party coverage typically includes -
▪ Business interruption
▪ Cyber extortion
▪ Data restoration
▪ Forensic costs
▪ Crisis management
▪ Legal costs
▪ Notification, call center, credit monitoring/identity restoration
Breach Response: Remediation (cont’d)
• Insurance Considerations (Cont’d)
✓ 3rd party coverage typically includes -
▪ Regulatory investigation
▪ PCI assessments and fines
▪ Lawsuits
▪ Insurance coverage frequently requires notice to the insurer prior to hiring counsel or any
investigators or other vendors, so notify the insurer as soon as possible
Trending Topics: Ransomware
• Ransomware is a growing threat, particularly since the pandemic increased remote work
o Companies may face both paying a ransom and then dealing with a data breach
remediation
o Attacks on critical infrastructure, such as the Colonial Pipeline incident in May 2021
o FBI and other agencies prioritized fighting ransomware in a similar way to fighting
terrorism
o Email is among the most prevalent attack vectors used to deliver ransomware
• In 2020, the U.S. Office of Foreign Asset Control (OFAC issued guidance stating that the
government would start enforcing sanctions in connection with ransomware attacks
o OFAC announced it would enforce it not only against ransomware victims, but also
against their insurers and the intermediaries hired by companies or their insurers,
such as cybersecurity firms that negotiate with threat actors
• Insurance may be available for ransomware, but many policies require consent prior to
making a payment
Trending Topics: Standing for data breach victims in
court
• Plaintiffs in data breach litigation have had an uphill battle in establishing standing when
there is only an increased risk of identify theft due to a data breach
• McMorris Factors (McMorris v. Carlos Lopez & Associates LLC, 995 F.3d 295 (2d Cir.
2021)):
o Whether plaintiff’s data was exposed as the result of a targeted attempt to obtain the
data
o Whether any portion of the compromised dataset already has been misused; and
o Whether the exposed data includes high-risk information – e.g., Social Security
numbers and dates of birth
About the Faculty
41
About The Faculty
Kathryn Nadro - knadro@sfgh.com
Kathryn (“Katie”) Nadro leads Sugar Felsenthal Grais & Helsinger’s Data Security and Privacy practice.
Katie advises clients on a diverse array of business matters, including data security and privacy
compliance, commercial and business disputes, and employment issues. Katie works with individuals
and businesses of all sizes to craft successful resolutions tailored to each individual matter.
Katie is a Certified Information Privacy Professional (CIPP/US) and counsels clients on a variety of data
security and privacy issues, including breach response, policy drafting, program management, data
collection, vendor management, and compliance with ever-changing state, federal, and international
privacy law. Katie also has broad litigation experience representing companies and individuals in
contract, non-compete, discrimination, harassment, fiduciary duty, and trade secret litigation in state
and federal court. With a background as both in-house and outside counsel, Katie understands that
business objectives, time, and resources play an important role in reaching a favorable outcome for
each client.
42
About The Faculty
J. Eduardo Campos - jeduardo.campos@embedded-knowledge.com
After creating business growth opportunities on four continents, J. Eduardo Campos spent thirteen
years at Microsoft, first as a cybersecurity advisor, then leading innovative projects at the highest
levels of government in the U.S. and abroad. Today, Eduardo is living his dream of building a better
tomorrow through his consulting firm, Embedded-Knowledge, Inc. Working with organizations and
entrepreneurs, he develops customized business strategies and forms partnerships focused on
designing creative solutions to complex problems.
43
About The Faculty
Anna Mercado Clark - AClark@phillipslytle.com
As leader of Phillips Lytle’s Data Security & Privacy and E-Discovery & Digital Forensics Practice Teams, Ms. Clark
focuses on complex e-discovery and digital forensics, cybersecurity and data privacy, and complex commercial
litigation. As a former Assistant District Attorney, she also handles white collar criminal matters and investigations.
Additionally, Ms. Clark has been awarded the following ANSI-accredited credentials by the International
Association of Privacy Professionals (IAPP): Certified Information Privacy Professional/Europe (CIPP/E) and
Certified Information Privacy Professional for the U.S. Private Sector (CIPP/US), preeminent certifications for
advanced concentration in European data protection laws and U.S. private-sector laws, standards and practices,
respectively. Ms. Clark routinely counsels sophisticated clients on data governance issues to address business
needs while minimizing risks and complying with a rapidly evolving regulatory landscape and other legal
obligations. She has extensive experience advising businesses in the technology, consumer, health care and
financial industries regarding information management and disposition policies, litigation readiness, data transfers,
third-party/vendor negotiation and management relative to data administration, and disaster recovery and
avoidance.
To read more, go to https://www.financialpoise.com/webinar-faculty/anna-mercado-clark/
44
About The Faculty
Cassandra M. Porter - caporter@zuora.com
Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company working to
transform clients’ businesses, operations and technology models for the digital era. She counsels internal clients on
privacy-related matters such as data collection practices, online advertising, mobile commerce, along with the
development and acquisition of new technology, data incidents and management. Cassandra is a member of the inaugural
class of Privacy Law Specialists, a new specialty recognized by the American Bar Association, and a Fellow of Information
Privacy by the International Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified Information
Privacy Professional and Certified Information Privacy Manager designate her as thought leader in the field. She is a
former co-chair of the IAPP’s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory Committee for the
District of New Jersey. As a member of the United States Trustee’s Consumer Privacy Ombudsman (CPO) panel, she
served as the CPO in the Golfsmith International chapter 11 cases. Previously she was counsel at Lowenstein Sandler LLP
where, in addition to assisting clients with data privacy-related issues, she also regularly represented debtors in
possession and creditors in chapter 11 matters along with indigents in chapter 7 proceedings in association with the
Volunteer Lawyers for Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia Morris, United States
Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney at Kaye Scholer LLP.
45
Questions or Comments?
If you have any questions about this webinar that you did not get to ask during the live
premiere, or if you are watching this webinar On Demand, please do not hesitate to email us
at info@financialpoise.com with any questions or comments you may have. Please include
the name of the webinar in your email and we will do our best to provide a timely response.
IMPORTANT NOTE: The material in this presentation is for general educational purposes
only. It has been prepared primarily for attorneys and accountants for use in the pursuit of
their continuing legal education and continuing professional education.
46
About Financial Poise
47
DailyDAC LLC, d/b/a Financial Poise™ provides
continuing education to attorneys, accountants,
business owners and executives, and investors. It’s
websites, webinars, and books provide Plain English,
entertaining, explanations about legal, financial, and
other subjects of interest to these audiences.
Visit us at www.financialpoise.com
Our free weekly newsletter, Financial Poise
Weekly, updates you on new articles published
on our website and Upcoming Webinars you
may be interested in.
To join our email list, please visit:
https://www.financialpoise.com/subscribe/

Mais conteúdo relacionado

Mais procurados

Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Advantage ppt data breaches km approved - final (djm notes)
Advantage ppt  data breaches   km approved - final (djm notes)Advantage ppt  data breaches   km approved - final (djm notes)
Advantage ppt data breaches km approved - final (djm notes)Dan Michaluk
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Dan Michaluk
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsResilient Systems
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Cleveland2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - ClevelandKegler Brown Hill + Ritter
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - Columbus2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - ColumbusKegler Brown Hill + Ritter
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspacetimmcguinness
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Dan Michaluk
 

Mais procurados (20)

Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Advantage ppt data breaches km approved - final (djm notes)
Advantage ppt  data breaches   km approved - final (djm notes)Advantage ppt  data breaches   km approved - final (djm notes)
Advantage ppt data breaches km approved - final (djm notes)
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016Canadian Association of University Solicitors - Privacy Update 2016
Canadian Association of University Solicitors - Privacy Update 2016
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Cleveland2017 Legal Seminar for Credit Professionals - Cleveland
2017 Legal Seminar for Credit Professionals - Cleveland
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - Columbus2017 Legal Seminar for Credit Professionals - Columbus
2017 Legal Seminar for Credit Professionals - Columbus
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice Cyber Insurance and Incident Response Practice
Cyber Insurance and Incident Response Practice
 

Semelhante a Data Breach Response: Before and After the Breach

CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...Financial Poise
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsPeter Henley
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramFinancial Poise
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmNext Dimension Inc.
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetIngenico ePayments
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guideJames Fisher
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 

Semelhante a Data Breach Response: Before and After the Breach (20)

CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
 
Experion Data Breach Response Excerpts
Experion Data Breach Response ExcerptsExperion Data Breach Response Excerpts
Experion Data Breach Response Excerpts
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law Firm
 
GlobalCollect Data Breach Factsheet
GlobalCollect Data Breach FactsheetGlobalCollect Data Breach Factsheet
GlobalCollect Data Breach Factsheet
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide2014-2015-data-breach-response-guide
2014-2015-data-breach-response-guide
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 

Mais de Financial Poise

IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileIP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileFinancial Poise
 
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics  IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics Financial Poise
 
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingTHE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingFinancial Poise
 
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!Financial Poise
 
PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style Financial Poise
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...Financial Poise
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 Financial Poise
 
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...Financial Poise
 
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas Financial Poise
 
BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business Financial Poise
 
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101Financial Poise
 
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts Financial Poise
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...Financial Poise
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...Financial Poise
 
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...Financial Poise
 
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsM&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsFinancial Poise
 
M&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessM&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessFinancial Poise
 
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveCROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveFinancial Poise
 
CROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for IntermediariesCROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for IntermediariesFinancial Poise
 
CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective Financial Poise
 

Mais de Financial Poise (20)

IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You FileIP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
IP-301 POST-GRANT REVIEW TRIALS 2022 - Things to Consider Before You File
 
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics  IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
IP-301 POST-GRANT REVIEW TRIALS 2022 - PGRT Basics
 
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day HearingTHE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
THE NUTS & BOLTS OF BANKRUPTCY LAW 2022: The Nuts & Bolts of a First Day Hearing
 
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
RESTRUCTURING, INSOLVENCY & TROUBLED COMPANIES 2022: Bad Debtor Owes Me Money!
 
PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style PERSUASIVE BRIEF WRITING 2022 - Style
PERSUASIVE BRIEF WRITING 2022 - Style
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 - Enforcement: Post-Judgment Procee...
 
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101 NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
NEWBIE LITIGATOR SCHOOL - 101 Part 3 2022 -Appellate Practice- 101
 
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
MARKETING TIPS FOR THE NEW (OR OLD!) BUSINESS OWNER 2022: Learn How to Do Con...
 
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
CHAPTER 11 - INDUSTRY FOCUS 2022 - Focus on Oil and Gas
 
BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business BUSINESS LAW REVIEW- 2022: Selling a Business
BUSINESS LAW REVIEW- 2022: Selling a Business
 
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
BUSINESS LAW REVIEW- 2022: Immigration Law for Business-101
 
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
NEWBIE LITIGATOR SCHOOL - Part I 2022: Working With Experts
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Executive Compensat...
 
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...CORPORATE  REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
CORPORATE REGULATORY COMPLIANCE BOOT CAMP 2022 - PART 2: Securities Law Comp...
 
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
M&A BOOT CAMP - 2022: Post-Closing Issues -Integration & Potential Buyer Sell...
 
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A AgreementsM&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
M&A BOOT CAMP 2022 - Key Provisions in M&A Agreements
 
M&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A ProcessM&A BOOT CAMP 2022 - The M&A Process
M&A BOOT CAMP 2022 - The M&A Process
 
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's PerspectiveCROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Investor's Perspective
 
CROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for IntermediariesCROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
CROWDFUNDING 2022 - Securities Crowdfunding for Intermediaries
 
CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective
CROWDFUNDING 2022 - Crowdfunding from the Start-Up's Perspective
 

Último

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Data Breach Response: Before and After the Breach

  • 1.
  • 2. 2 Practical and entertaining education for attorneys, accountants, business owners and executives, and investors.
  • 3. Disclaimer The material in this webinar is for informational purposes only. It should not be considered legal, financial or other professional advice. You should consult with an attorney or other appropriate professional to determine what may be best for your individual needs. While Financial Poise™ takes reasonable steps to ensure that information it publishes is accurate, Financial Poise™ makes no guaranty in this regard. 3
  • 4.
  • 5. Meet the Faculty MODERATOR: Kathryn Nadro – Sugar, Felsenthal, Grais & Helsinger LLP PANELISTS: J. Eduardo Campos – Embedded-Knowledge, Inc. Anna Mercado Clark – Phillips Lytle LLP Cassandra Porter – Zuora 5
  • 6. About This Webinar-Data Breach Response: Before and After the Breach You’ve received the dreaded call that your company has just suffered a data breach – what do you do next? Who do you call for help? What notification obligations do you have? With proper preparation, you can mitigate the damage caused by this unfortunate event and put your business in a position to recover. Your company may have already implemented its information security program and identified the responsible parties, including applicable outside experts, to be contacted in the event of a breach. However, now you must call up your incident response team to investigate the extent of the breach, evaluate the possible damage to your company, and determine whether you must notify your clients, customers, or the public of the breach. This webinar will help prepare you to take action when the worst happens. 6
  • 7. About This Series Cyber Security & Data Privacy 2021 Cybersecurity and data privacy are critical topics of concern for every business in today’s environment. Data breaches are a threat to every business and can cause both direct losses from business interruption and loss of data to indirect losses from unwanted publicity and damage to your business’s reputation. Compliance with a patchwork of potentially applicable state and federal laws and regulations may cost your business in terms of money and time. This series discusses the various laws and regulations that affect businesses in the United States and in Europe, as well as the best practices to use in creating an information security program and preparing for and responding to data breaches. Each Financial Poise Webinar is delivered in Plain English, understandable to investors, business owners, and executives without much background in these areas, yet is of primary value to attorneys, accountants, and other seasoned professionals. Each episode brings you into engaging, sometimes humorous, conversations designed to entertain as it teaches. Each episode in the series is designed to be viewed independently of the other episodes so that participants will enhance their knowledge of this area whether they attend one, some, or all episodes. 7
  • 8. Episodes in this Series #1 Introduction to US Privacy and Data Security: Regulations and Requirements Premiere date: 08/04/21 #2: Introduction to EU General Data Protection Regulation: Planning, Implementation, and Compliance Premiere date: 9/01/21 #3: How to Build and Implement your Company's Information Security Program Premiere date: 10/06/21 #4: Data Breach Response: Before and After the Breach Premiere date: 11/03/21 8
  • 9. Episode #4: Data Breach Response: Before and After the Breach 9
  • 10. Overview • What is a Data Breach? ✓ Simply put, a data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion ✓ Data breach may have different meanings under various state, federal, and international laws • Data Breach Consequences ✓ Substantial costs in breach response ✓ Private lawsuits ✓ Government fines ✓ Reputational harm
  • 11. Overview • Data Breach Facts (IBM Cost of a Data Breach Report 2021) ✓ Per Record with Personally Identifiable Information: approximately $180 ✓ 10% increase in average total cost of a breach from 2020 to 2021 ✓ $4.62 million average total cost of a ransomware breach ✓ $4.24 million global average total cost of a data breach • Average Data Breach Costs According to Each Industry ✓ Healthcare: $9.23 million ✓ Financial: $5.72 million ✓ Communications: $3.62 million ✓ Industrial: $4.24 million
  • 12. Overview • Data Breach Costs (cont’d) ✓ A few costs include - ▪ Computer forensics ▪ Breach notification mailing, call centering and identity restoration services costs ▪ Public relations ▪ Regulatory investigation, fines and penalties ▪ Lawsuit(s) ▪ Legal services • Average number of days to identify and contain a breach: 287 days
  • 13. Overview • Data Breach Causes ✓ Malware/Ransomware ✓ Unsecured website login systems ✓ Use of unapproved, insecure software ✓ Insecure IT infrastructure ✓ Phishing/e-mail scam ✓ Employees mishandling data ✓ Human factor/negligence
  • 14. Overview • Data Breach Goals ✓ Money ✓ Theft of personal information ▪ Purchase of goods with stolen credit card information ✓ Filing of fraudulent tax returns ✓ Sale of personal information ✓ Disgruntled employee(s) use of information ✓ Corporate espionage
  • 15. So, You Think You’ve Been Breached… • Know who to call ✓ Incident Response Team ✓ Management ✓ Legal counsel ✓ IT support ✓ Public relations ✓ Forensic support ✓ Insurance ✓ Consider contractual obligations
  • 16. So, You Think You’ve Been Breached… (cont’d) • Breach Response ✓ Identify ▪ Determine if a breach actually occurred ✓ Investigate ▪ How did the breach occur? ✓ Contain ▪ Contain and mitigate the data breach ✓ Notify ▪ Provide notifications ✓ Remediate ▪ Prevent reoccurrence of breach
  • 17. Breach Response: Identify/Detect • First, identify if an incident is a data breach ✓ Employees may have exposed sensitive personal data by accident; ✓ Common indicators of compromise include – o unusual login times o reduced operating speeds across the network or heavy, unexplained traffic o use of nonstandard command prompts o unexpected restarts o use of unusual software o malfunctioning of antivirus/security software o the presence of unexpected IPs
  • 18. Breach Response: Identify/Detect (cont’d) • Identify if an incident is a data breach (cont’d) ✓ Security monitoring systems (cont’d) ▪ Top Cyber Threat Vulnerabilities o Phishing o Malware o Ransomware o Data Breaches o Compromised passwords ▪ Conduct Cyber Threat Assessments o A good cyber threat assessment offers security and threat prevention by exposing application vulnerabilities; o detecting malware and botnets; o identifying “at risk” devices
  • 19. Breach Response: Identify/Detect (cont’d) • Second, investigate promptly ✓ Consider relevant facts ✓ Inside or outside threat? ✓ Conduct interviews ✓ Analyze compromised systems ✓ Identify malware employed, if applicable ✓ Engage forensic experts, as appropriate ✓ Engage legal counsel early in the process ✓ Reconstruct the incident
  • 20. Breach Response: Identify/Detect (cont’d) • Second, investigate promptly (Cont’d) ✓ Evaluate the nature, extent, and scope of incident ✓ What information was improperly disclosed? ✓ Was the information recovered? ✓ When and how did the incident happen? ✓ How many individuals were affected? ✓ Does the incident involve residents of multiple states? ✓ Document the investigation findings, conclusion and rationale
  • 21. Breach Response: Containment • Third, once you discover you’ve been breached, contain the breach • Move quickly to secure systems and fix vulnerabilities • Mobilize breach response team ASAP • Assemble a team of experts based on the size of your company, including: ✓ Forensics ✓ Legal ✓ Internal team leader
  • 22. Breach Response: Containment • The First 24 Hours Checklist ✓ Record the date and time when the breach was discovered & response efforts begin ✓ Alert and activate everyone on the response team ✓ Secure the premises around the area where the data breach occurred to help preserve evidence
  • 23. Breach Response: Containment • The First 24 Hours Checklist (Cont’d) ✓ Stop additional data loss ▪ Take devices offline but DO NOT turn off ✓ Assess priorities and risks ✓ Notify customers, affected businesses, law enforcement and other regulatory agencies
  • 24. Breach Response: Fix Vulnerabilities • Service providers ✓ Ensure service providers that have access to sensitive personal data remedy their vulnerabilities to protect against another breach • Network segmentation ✓ Prevents breach on one server from leaking over to another server ✓ Determine if network segmentation is correct
  • 25. Breach Response: Fix Vulnerabilities • Work with forensic experts ✓ Encryption enabled ✓ Analyze backup or preserved data ✓ Review the type of information compromised • Develop a communication plan ✓ Develop comprehensive plan to communicate internally
  • 26. Breach Response: Breach Team • Forensics Team - helps determine the source and scope of breach ✓ Captures forensic images of affected systems ✓ Collects and analyze evidence, and ✓ Outlines remediation steps • Hire independent forensics investigators
  • 27. Breach Response: Breach Team • Legal Counsel - helps identify your legal obligations ✓ Identifies state and federal regulations regarding data breaches for your industry ✓ Identifies entities that need to be notified, i.e. customers, employees, government agencies, regulation boards, etc. ✓ May provide privilege to the investigation process if retained early enough and if directs forensic investigation ❑ Certain courts have refused to apply privilege to investigation even under those circumstances ✓ Ensures notifications occur within any mandated timeframes
  • 28. Breach Response: Notice • Fourth, determine your notification obligations • Potential parties to notify: ✓ Customers ✓ Law enforcement and other regulatory agencies ✓ Affected businesses
  • 29. Breach Response: Notice (cont’d) • Notification requirements vary based on state, federal, and international law ✓ All 50 U.S. states require some level of notification to individuals when a breach occurs ✓ If breaches reach a certain size (e.g., over 500 individuals), many states require notification to attorneys general ✓ Notification generally must occur within a “reasonable time” after the breach is discovered ✓ Generally, must include description of the circumstances of the breach, steps taken to remedy the incident, steps intended to be taken after the notification, and occasionally whether law enforcement is involved in investigating the incident ✓ International law may be stricter than your specific state ✓ GDPR requires notice in 72 hours in some cases
  • 30. Breach Response: Notice…to the FBI? • Consider contacting the FBI and/or local authorities when a breach involves: o Significant loss in data, system availability, or control of systems o A large number of victims o Unauthorized access to or malicious software on critical information technology systems o Critical infrastructure or core government functions o National security, economic security, or public health and safety o Financial transactions, such as unauthorized wire transfers
  • 31. Breach Response: Remediation • Fifth, remediate the data breach • Generally long and thorough and requires looking at other potential flaws in security infrastructure • Develop a remediation plan that is tailored to the breach incident to prevent it from happening again ✓ Honest & true assessment of cause of breach
  • 32. Breach Response: Remediation (cont’d) • A few remediation practices include - ✓ Developing an internal and external communications plan ✓ Strengthen data security policies ✓ Planning to prevent reoccurrence ✓ Providing additional training to employees on data security ✓ Maintaining documentation of actions ✓ Insurance considerations
  • 33. Prevention is Better than Remediation: Data Breach Response Plan • What is a data breach response plan? ✓ Aims to help you manage a data breach ✓ Provides a framework that sets out roles and responsibilities for managing an appropriate response to data breach ✓ Describes steps an entity should take to manage a breach, should one occur • Why do you need a data breach response plan? ✓ Provides clarity and mitigates confusion ✓ Gives all employees knowledge of how to address a data breach ✓ Establishes a chain of command and responsibilities of each employee ✓ Quicker response time to fixing the breach
  • 34. Data Breach Response Plan • A data breach response plan should: ✓ Provide the actions to be taken if a breach is suspected, discovered or reported by a staff member, including when it is to be escalated to the response team ✓ Identify members of your data breach response team (response team) ✓ Identify the actions the response team is expected to take ✓ Be in writing ▪ Staff and employees could clearly understand the roles and responsibilities ✓ Identify goals and objectives of the plan
  • 35. Data Breach Response Plan • Data breach response plan should cover: ✓ A strategy for assessing, managing and containing data breaches ✓ A clear explanation of what constitutes a data breach ✓ The reporting line if staff do suspect a data breach ✓ The circumstances in which the breach can be handled by a line manager or when it should be escalated to the response team ✓ Recording data breaches ✓ A strategy to identify and address any weaknesses in data handling that contributed to the breach ✓ A system for a post-breach review and assessment of your entity’s response to the data breach and the effectiveness of your data breach response plan ✓
  • 36. Breach Response: Remediation • Insurance Considerations ✓ Traditional policies E&O D&O ▪ CGL ✓ These policies frequently do not cover costs arising out of a security incident or data breach
  • 37. Breach Response: Remediation (cont’d) • Insurance Considerations (Cont’d) ✓ 1st party coverage typically includes - ▪ Business interruption ▪ Cyber extortion ▪ Data restoration ▪ Forensic costs ▪ Crisis management ▪ Legal costs ▪ Notification, call center, credit monitoring/identity restoration
  • 38. Breach Response: Remediation (cont’d) • Insurance Considerations (Cont’d) ✓ 3rd party coverage typically includes - ▪ Regulatory investigation ▪ PCI assessments and fines ▪ Lawsuits ▪ Insurance coverage frequently requires notice to the insurer prior to hiring counsel or any investigators or other vendors, so notify the insurer as soon as possible
  • 39. Trending Topics: Ransomware • Ransomware is a growing threat, particularly since the pandemic increased remote work o Companies may face both paying a ransom and then dealing with a data breach remediation o Attacks on critical infrastructure, such as the Colonial Pipeline incident in May 2021 o FBI and other agencies prioritized fighting ransomware in a similar way to fighting terrorism o Email is among the most prevalent attack vectors used to deliver ransomware • In 2020, the U.S. Office of Foreign Asset Control (OFAC issued guidance stating that the government would start enforcing sanctions in connection with ransomware attacks o OFAC announced it would enforce it not only against ransomware victims, but also against their insurers and the intermediaries hired by companies or their insurers, such as cybersecurity firms that negotiate with threat actors • Insurance may be available for ransomware, but many policies require consent prior to making a payment
  • 40. Trending Topics: Standing for data breach victims in court • Plaintiffs in data breach litigation have had an uphill battle in establishing standing when there is only an increased risk of identify theft due to a data breach • McMorris Factors (McMorris v. Carlos Lopez & Associates LLC, 995 F.3d 295 (2d Cir. 2021)): o Whether plaintiff’s data was exposed as the result of a targeted attempt to obtain the data o Whether any portion of the compromised dataset already has been misused; and o Whether the exposed data includes high-risk information – e.g., Social Security numbers and dates of birth
  • 42. About The Faculty Kathryn Nadro - knadro@sfgh.com Kathryn (“Katie”) Nadro leads Sugar Felsenthal Grais & Helsinger’s Data Security and Privacy practice. Katie advises clients on a diverse array of business matters, including data security and privacy compliance, commercial and business disputes, and employment issues. Katie works with individuals and businesses of all sizes to craft successful resolutions tailored to each individual matter. Katie is a Certified Information Privacy Professional (CIPP/US) and counsels clients on a variety of data security and privacy issues, including breach response, policy drafting, program management, data collection, vendor management, and compliance with ever-changing state, federal, and international privacy law. Katie also has broad litigation experience representing companies and individuals in contract, non-compete, discrimination, harassment, fiduciary duty, and trade secret litigation in state and federal court. With a background as both in-house and outside counsel, Katie understands that business objectives, time, and resources play an important role in reaching a favorable outcome for each client. 42
  • 43. About The Faculty J. Eduardo Campos - jeduardo.campos@embedded-knowledge.com After creating business growth opportunities on four continents, J. Eduardo Campos spent thirteen years at Microsoft, first as a cybersecurity advisor, then leading innovative projects at the highest levels of government in the U.S. and abroad. Today, Eduardo is living his dream of building a better tomorrow through his consulting firm, Embedded-Knowledge, Inc. Working with organizations and entrepreneurs, he develops customized business strategies and forms partnerships focused on designing creative solutions to complex problems. 43
  • 44. About The Faculty Anna Mercado Clark - AClark@phillipslytle.com As leader of Phillips Lytle’s Data Security & Privacy and E-Discovery & Digital Forensics Practice Teams, Ms. Clark focuses on complex e-discovery and digital forensics, cybersecurity and data privacy, and complex commercial litigation. As a former Assistant District Attorney, she also handles white collar criminal matters and investigations. Additionally, Ms. Clark has been awarded the following ANSI-accredited credentials by the International Association of Privacy Professionals (IAPP): Certified Information Privacy Professional/Europe (CIPP/E) and Certified Information Privacy Professional for the U.S. Private Sector (CIPP/US), preeminent certifications for advanced concentration in European data protection laws and U.S. private-sector laws, standards and practices, respectively. Ms. Clark routinely counsels sophisticated clients on data governance issues to address business needs while minimizing risks and complying with a rapidly evolving regulatory landscape and other legal obligations. She has extensive experience advising businesses in the technology, consumer, health care and financial industries regarding information management and disposition policies, litigation readiness, data transfers, third-party/vendor negotiation and management relative to data administration, and disaster recovery and avoidance. To read more, go to https://www.financialpoise.com/webinar-faculty/anna-mercado-clark/ 44
  • 45. About The Faculty Cassandra M. Porter - caporter@zuora.com Cassandra M. Porter is the Americas/APAC data privacy lead attorney for a Fortune 100 Tech company working to transform clients’ businesses, operations and technology models for the digital era. She counsels internal clients on privacy-related matters such as data collection practices, online advertising, mobile commerce, along with the development and acquisition of new technology, data incidents and management. Cassandra is a member of the inaugural class of Privacy Law Specialists, a new specialty recognized by the American Bar Association, and a Fellow of Information Privacy by the International Association of Privacy Professionals (IAPP). Her IAPP credentials as a Certified Information Privacy Professional and Certified Information Privacy Manager designate her as thought leader in the field. She is a former co-chair of the IAPP’s New Jersey Chapter and member of the Bankruptcy Lawyers Advisory Committee for the District of New Jersey. As a member of the United States Trustee’s Consumer Privacy Ombudsman (CPO) panel, she served as the CPO in the Golfsmith International chapter 11 cases. Previously she was counsel at Lowenstein Sandler LLP where, in addition to assisting clients with data privacy-related issues, she also regularly represented debtors in possession and creditors in chapter 11 matters along with indigents in chapter 7 proceedings in association with the Volunteer Lawyers for Justice. Prior to joining Lowenstein, she clerked for the Honorable Cecelia Morris, United States Bankruptcy Judge for the Southern District of New York and was the Assistant Managing Attorney at Kaye Scholer LLP. 45
  • 46. Questions or Comments? If you have any questions about this webinar that you did not get to ask during the live premiere, or if you are watching this webinar On Demand, please do not hesitate to email us at info@financialpoise.com with any questions or comments you may have. Please include the name of the webinar in your email and we will do our best to provide a timely response. IMPORTANT NOTE: The material in this presentation is for general educational purposes only. It has been prepared primarily for attorneys and accountants for use in the pursuit of their continuing legal education and continuing professional education. 46
  • 47. About Financial Poise 47 DailyDAC LLC, d/b/a Financial Poise™ provides continuing education to attorneys, accountants, business owners and executives, and investors. It’s websites, webinars, and books provide Plain English, entertaining, explanations about legal, financial, and other subjects of interest to these audiences. Visit us at www.financialpoise.com Our free weekly newsletter, Financial Poise Weekly, updates you on new articles published on our website and Upcoming Webinars you may be interested in. To join our email list, please visit: https://www.financialpoise.com/subscribe/