How to create Breach Management Processes to better protect your organization
Webcast: How to Adapt Your Incident and Breach Response Strategy to Today’s Regulatory Environment
Wednesday, November 18, 2020 at 2pm EST | 11am PST |
SIGN UP NOW! |
In today’s ever-changing regulatory landscape, it is vital for legal professionals to build an incident and breach response process that ensures consistent, documented, defensible, and ongoing compliance to avoid severe monetary and reputational penalties. In this webcast, understand how to create breach management and notification processes and employ risk transfer solutions to better protect your organization overall. Register for this webcast to learn: • How to establish a defensible incident and breach response plan from incident detection to after a breach occurs. • The vital role technology plays to reduce the risk of an incident. • Coverages provided by cyber insurance policies to mitigate the financial impact, as well as response and recovery resources. • Practical ways to establish and maintain privilege after a cyber event. Can’t attend? Register here for an on-demand recording after the webcast. |
Featured Speakers: DAVID ZETOONY Shareholder, Co-Chair U.S. Data Privacy and Security Practice | Greenberg Traurig, LLP JARRETT KOLTHOFFCEO | SpearTip REBECCA PERRYDirector of Strategic Partnerships | Exterro FLORENCE LEVYUS Cyber and Commercial E&O Insurance Advisor | Marsh |
SIGN UP NOW! |