Protecting Data & Dealing with Breaches Globally in 2017
Best practices for local and multi-location businesses
- Product Number: 2170183P01
-
CLE Credits, earn up to:
3 substantive credits, 0 ethics credits CLE Credit Note -
Add to Favorites List
Choose Date/Location:
-
Product Description
Product Description
The continuing explosion of data security issues locally, nationally, and internationally created new challenges for Massachusetts businesses. It is no longer optional to have a working understanding of the critical need to protect competitively and personally sensitive data from theft or accidental disclosure. Massachusetts’ State Information Security Rules (201 CMR 17.00) are arguably the toughest in the nation. And the evolving set of state and federal laws, including regulatory and litigation developments, add another layer of complexity—further compounded by global developments, including an entirely new Europe-U.S. data security regime and a continued ramping up of overseas threats to locally based data.
This program provides a comprehensive overview of data security developments affecting Massachusetts businesses and institutions in 2017. The faculty focus on the key legal and operational measures that should be encompassed in any effective information security program—with new emphasis this year on global issues, recent litigation precedents affecting exposure to class action lawsuits for significant breaches, and emerging insurance coverage issues. The panel also provides a timely update on recent enforcement trends and the evolving roles of the Consumer Protection Division of the Massachusetts Attorney General’s Office as reviewers of business practices and protectors of consumer rights relative to sensitive data.
- Potentially Applicable Data Security Laws and Key Recent Developments for Each
- Factors and Risk Areas Considered During an Information Security Audit
- Key IT and Operational Protections Needed to Limit Risk of Intentional Theft or Inadvertent Disclosures of Sensitive Data
- The Data Breach “Kill Chain” and Best Practices to Prevent or Detect Potential Problems at Each Stage
- Key IT Measures to Address Global Threats
- Top Signs That YoMay Need to Review Your Current Program
- Creating an Effective WISP
- Best Practices for Data Breach Preparation and Response
- Recent Developments in State, U.S., and Global Data Protection and Enforcement—and the Outlook Ahead
- Overview of Breach-Related Litigation Risks and Recent Developments
- Update on Current State of Breach-Related Insurance Coverage Issues
- AG’s Office Suggested Practices in Consumer Disclosures and Emerging Data Security Risks and Threats That Require Attention, Including Global Concerns
- “Ask the Experts” Q&A Session
-
Agenda
Agenda & Materials
-
2:00–2:35 pm
Overview of Data Security Laws and Key Developments
on demand video Add to Cart -
2:35–3:05 pm
Overview of Data Security Audits and Risk Factors, including Global Risks
on demand video Add to CartMichael W. Hammond, CISA,CRISC,CISSP,CEH, O'Connor & Drew, PC, CPA , Braintree
-
3:05–3:25 pm
Best Practices for WISPs and Other Security Policies
on demand video Add to Cart -
3:25–3:35 pm
Networking and Refreshment Break
-
3:35–3:55 pm
State Enforcement Review, Perspective of the Massachusetts Attorney General’s Office, and New Global Threats
on demand video Add to Cart -
3:55–4:45 pm
Litigation Risks and Key Insurance Coverage Issues
on demand video Add to Cart -
4:45–5:00 pm
"Ask the Experts" Q&A Session
Panel
Please Note
MCLE webcasts are delivered completely online, underscoring their convenience and appeal. There are no published print materials. All written materials are available electronically only. They are posted 24 hours prior to the program and can be accessed, downloaded, or printed from your computer.
-
- Faculty