A Three-Part Series of Webcasts About Data Breach Response and Cybersecurity, Designed Exclusively For CFOs, GCs and CCOs
Once thought of solely as IT issues, cybersecurity and data breach response have now evolved into core “C-suite” concerns, particularly relevant to CFOs, GCs and CCOs.
In the aftermath of a data breach, companies must respond to a complicated and expensive crisis that requires management of multiple workflows in a highly-compressed time period. In addition, a company may well be exposed to other, longer-term intangible costs, including reputational damage, loss of productivity, management drag, and problems with employee morale and lags in overall business performance.
GCs, CFOs and CCOs reside at the epicenter of all of data breach response workflow and potential liability, and this series of webcasts offers practical guidance and caveats for these executives from the perspective of a former computer crime prosecutor, data breach response expert and cybersecurity professional. Panelists will also include a range of other cyber and corporate risk experts who manage incident responses for public and private corporations.
Please join John Reed Stark, President of John Reed Stark Consulting LLC, (former head of the Washington, D.C. office of a global data breach response firm and former Chief of the SEC’s Office of Internet Enforcement) as he and his guest experts address these issues and your questions in this series of free, one-hour webcasts.
Please register at this link or below for any or all of the three-part series. You can also view each webcast after its airing as an archive on CybersecurityDocket.com.
Webcast One: What Every GC, CFO and CCO Needs To Know About
Data Breach Response
A data breach responder is like a high-tech plumber. Just like a plumber does when a house’s basement floods, data breach responders identify the cause of a breach; combine forces to contain its damage; and collaborate on remediation.
But while a plumber can provide reasonable assurances that the basement will not flood again, a data breach responder cannot promise the same about a future data breach. In fact, another breach is not only possible, it’s likely. That is why data breaches don’t define victim companies – how they respond to data breaches does.
Yet while today’s news outlets provide an endless stream of data breach reports, rarely is an actual incident response ever discussed. Understanding data breach response workflow not only helps a company prepare for a breach, it also helps a company manage cybersecurity risk overall. This webcast covers the most typical workflows that companies must undertake amid the incident response of a data breach.
The live version of this webcast is scheduled for Thursday, January 7th, 2016 at 1:00 PM EST. (Panelists: John Reed Stark and Brian L. Rubin, Partner, Sutherland Asbill & Brennan LLP)
Webcast Two: How Every GC, CFO and CCO Should be Preparing for the Inevitable
Data Breach
Although data breaches are inevitable, companies should still take important and thoughtful preemptive measures to meet their compliance obligations and to help prepare themselves to respond. This webcast focuses on preemptive steps that GCs, CFOs and CCOs should implement today to not only insure adequate preparation for the latest forms of data breaches, but also to assure adequate compliance amid increasing regulatory scrutiny.
The live version of this webcast is scheduled for Thursday, January 21st, 2016, at 1:00 PM EST. (Panelists: John Reed Stark and Jason Smolanoff, President of CISO Advisory & Investigations)
Webcast Three: What Every CFO, GC and CCO Needs to Know About Penetration Testing and Risk and Security Assessments
In addition to becoming a compliance prerequisite, so-called “penetration testing” and “risk and security assessments” also create added opportunities to:
- determine where cybersecurity vulnerabilities lie;
- remediate issues;
- improve processes; and
- beef-up enterprise security posture.
The emerging penetration testing marketplace, however, is a chaotic morass, with a mishmash of consultant jargon painting varying doomsday scenarios and pitching uniquely branded panaceas.
This webcast walks GCs, CFOs and CCOs through the “pen testing” maze, providing key insights on how to engage the right blend of capable, trustworthy and innovative cybersecurity professionals.
The live version of this webcast is scheduled for Thursday, February 4th, 2016, at 1:00 PM EST. (Panelists: John Reed Stark and Joe Segreti, Co-Founder, KoreLogic)