•  

Data Breaches - Don't Be a Headline "Ask Me Anything", Absolute Software

24 July 2014 from 10am to 11am

Currently in read only mode, sorry about that, please try again in a few hours.

Whether it's a HIPAA/HITECH, Sarbanes Oxley, Gramm-Leach-Bliley violation, or a State breach notification law, a data breach can have substantial legal and financial consequences, regardless of industry. All it takes is a single security lapse and the next thing you know, you're trending on Twitter (and not in a good way), and your CEO is resigning.

Just ask the former CEO and the CIO at Target, that data breach affected some 110 million people. Thanks to the breach, Target saw its sales drop to their lowest point in three years...and the jury's still out in terms of regulatory and civil penalties.

But it doesn't have to be this way. On July 24th, join Stephen Treglia, Legal Counsel at Absolute Software and former Assistant DA, Chief, Technology Crime Unit in New York, for a live "Ask Me Anything" Q&A at 10:00am PDT in the Absolute Software LinkedIn Group. Stephen will deconstruct a high profile data breach and show the phases of impact that continue to occur even years after the event. He'll also discuss:

  • Why every data breach to-date has been settled out of court
  • Why regulators care about the security protocols you had in place before a data breach ever occurs
  • Technical options to consider that could help you minimize - or even avoid - damaging outcomes
  • Other vulnerabilities that should be considered when responding to a security incident

This is a free event open to the public, however, you will need to be a member of the Absolute Software LinkedIn group. Joining the group is fast and easy; become a member today at: http://www.linkedin.com/groups/A...

1 speaker

  • Stephen Treglia Legal Counsel, Investigations Section, Absolute Software Corporation

Tell your friends!

Share this event with your friends on Twitter

Topics

Share

Claimed event

This event has been claimed

Guides

Related books

  • Securing the Virtual Environment, Included DVD: How to Defend the Enterprise Against Attack
  • A Guide to Kernel Exploitation: Attacking the Core
  • Professional Cocoa Application Security
  • Seven Deadliest Unified Communications Attacks (Seven Deadliest Attacks)
  • Solaris 10 Security Essentials
  • Schneier on Security

See something wrong?

Report an issue with this event