Not "If" But "When" - Responding to Data Breach
Location:
Marriott Downtown Chicago – Magnificent Mile
540 North Michigan Avenue
Chicago, IL 60611
Time:
4:00 pm - 5:00 pm
Speaker:
Kari Rollins
Overview:
Every day, we hear of another significant data breach, in which sensitive personal information, email and text messages, financial data, medical records, and all manner of other electronically stored information has been stolen, lost, or compromised. No industry has been untouched, and no organization is entirely safe. While prevention is the only “cure,” you and your organization must be prepared to address the near inevitability of a data breach. The Sedona Conference’s Working Group 11 on Data Security and Privacy Liability is developing comprehensive guidance for Information Governance professionals, ranging from a Primer on data privacy law to an Incident Response Guide. In this session, the editor of The Sedona Conference’s Incident Response Guide will walk us through the new publication and it resources, and explain the steps you need to take now to prepare yourself, before there has been a breach (at least, one that you know about).
KEY ISSUES THIS SESSION WILL ADDRESS
- What do the data privacy laws require of organizations and what kinds of data do they govern?
- What steps do organizations need to take to prepare to address a near inevitable data breach?
- What constitutes an acceptable response to the breach of sensitive data within an organization?
KEY TAKEAWAYS FROM THIS SESSION
Attendees of this session will:
- Become more familiar with the data privacy laws that govern various types of sensitive data.
- Understand what are the components of an acceptable Data Breach response plan.
- Receive specific guidance from The Sedona Conference’s Incident Response Guide to be used in creating specific response plans for their organizations.
BOTTOM LINE FROM THIS SESSION
A breach of sensitive data within your organization is almost inevitable (if it hasn’t already happened). While there are many things companies should be doing to protect the data they manage, it is equally important to prepare a comprehensive plan for how the organization will respond when a breach does occur. Serious financial, legal and reputational risk can arise from these situations and this session will highlight the best ways to prepare a response that can help mitigate these risks.
Click here for more information.