MMM’s goal is to work with data center owners, operators and users to identify key legal issues and their related claims, and to provide ways to minimize liability.
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Shawn Tuma
Presentation addresses issues in cybersecurity law of the evolving standards for data breach liability for companies as well as officers and directors. The event was sponsored by Above Security and the title of the event was Above Compliance – Navigating the Cybersecurity Landscape in Financial Services.
In the last several years, substantial data breaches or hacker attacks in the U.S. have shown no signs of abating. Neither have the class actions that typically follow in their wake. Bradley Arant discusses litigation trends in data breach class actions. The video will touch on evolving issues in these cases, including recent loosening of consumer standing requirements (in cases after the Supreme Court’s Clapper decision), class certification and other issues raised in the Target litigation. We will also provide an overview of recent settlements of data breach class actions and what they might mean for later cases. The webinar will address several issues pending before the Supreme Court this term that could have significant impact, including whether a statutory violation without other injury confers Article III standing, and the extent to which statistical evidence can be used to justify class certification.
Cyber risk related to information security is growing. A potentially huge exposure for transportation companies is the personal data of their current and prospective drivers.
Bradley's panel reacts to and addresses a hypothetical cyber incident involving a widespread compromise of consumer healthcare and financial information. Amy Leopard (Healthcare), Mike Pennington (Litigation), John Goodman (Litigation), Elena Lovoy (Financial Services), and moderator Paige Boshell (Intellectual Property, Financial Services) will offer legal and practical strategies to proactively respond to and resolve a specified data breach. Highlights will include customer notice strategies, attorney-client privilege and litigation avoidance strategies, and coordination with third parties, including external PR and forensic investigators, vendors, regulators, and law enforcement.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
Above Compliance – Navigating the Cybersecurity Landscape and Officer & Direc...Shawn Tuma
Presentation addresses issues in cybersecurity law of the evolving standards for data breach liability for companies as well as officers and directors. The event was sponsored by Above Security and the title of the event was Above Compliance – Navigating the Cybersecurity Landscape in Financial Services.
In the last several years, substantial data breaches or hacker attacks in the U.S. have shown no signs of abating. Neither have the class actions that typically follow in their wake. Bradley Arant discusses litigation trends in data breach class actions. The video will touch on evolving issues in these cases, including recent loosening of consumer standing requirements (in cases after the Supreme Court’s Clapper decision), class certification and other issues raised in the Target litigation. We will also provide an overview of recent settlements of data breach class actions and what they might mean for later cases. The webinar will address several issues pending before the Supreme Court this term that could have significant impact, including whether a statutory violation without other injury confers Article III standing, and the extent to which statistical evidence can be used to justify class certification.
Cyber risk related to information security is growing. A potentially huge exposure for transportation companies is the personal data of their current and prospective drivers.
Bradley's panel reacts to and addresses a hypothetical cyber incident involving a widespread compromise of consumer healthcare and financial information. Amy Leopard (Healthcare), Mike Pennington (Litigation), John Goodman (Litigation), Elena Lovoy (Financial Services), and moderator Paige Boshell (Intellectual Property, Financial Services) will offer legal and practical strategies to proactively respond to and resolve a specified data breach. Highlights will include customer notice strategies, attorney-client privilege and litigation avoidance strategies, and coordination with third parties, including external PR and forensic investigators, vendors, regulators, and law enforcement.
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
The United States has no federal data security or privacy law covering all businesses or all U.S. citizens. Instead, federal agencies and individual states have created their own patchwork of laws and regulations which must be evaluated for their application to a business.
This webinar will help you navigate the overlapping and sometimes confusing system of laws and regulations which may impact your business, ranging from emerging state-level privacy legislation to the numerous data breach notification statutes to cybersecurity regulations with extraterritorial effect.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-regulations-and-requirements-2021/
Lost laptops, misplaced paper records, cyber theft - breaches are a fact of life. But they don't have to be a disaster. Breach veterans know that the impact of a data loss event is substantially determined by what happens in the 48 hours after you find out about it. Get things right, and even a substantial and public breach can be weathered gracefully. Mess things up, and a small breach can turn into a nightmare.
This webinar will review critical steps organizations can take in the wake of a breach. Our featured speaker will be privacy and compliance expert, Deb Hampson who is an AVP & Assistant General Counsel at The Hartford. Don't miss this opportunity to learn best practices from a proven professional.
Digital Information Law & Your Business - The Alternative BoardShawn Tuma
A discussion for business owners of digital information law issues of social media law, data security and data breach law, and trade secrets and corporate espionage issues.
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud SummitShawn Tuma
Shawn Tuma's presentation with Christopher Mitchell (of Crowe Horwath) at The Institute of Internal Auditors 9th Annual Fraud Summit. The title of the presentation is The Legal Side of Data Breach and Third Party Risk.
The main point of the presentation is that when a company is breached through the fault of one of its third-party business associates, or other third-parties, the company is still responsible for all of the repercussions arising out of the breach and, at best, will then have to go and pursue its rights against the third party. Thus, companies need to ensure that their business associates and other third parties adhere to proper data security practices and they should be audited to ensure compliance.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union. http://www.nafcu.org/affinion
“Cyber Liability & Cyber Insurance” - A discussion on best practices around Prevention, Detection, and Response!
Sponsored by Datto and Webster Bank
Series brought to you by the Connecticut Technology Council.
____________
TOPIC FOCUS:
1. Evolution and acceptance of Cybersecurity insurance
a. Understanding risk & effect on businesses
i. Used to be major brands, now widespread.
ii. Risk recognized, business leaders looking to minimize risk
b. Describing changes in cybersecurity insurance
How coverages have evolved - not just for biggest companies
i. Insurers are working with (tech) companies to get it right
ii. Where is it going from here? Trends, specialty insurance
2. Describe insurance types/ specifics and how they perform when needed
. Not all policies are the same
a. What to look for
b. How they vary by type of business (Healthcare vs. Retail vs. Software Co.)
c. What gaps still remain (What can’t get covered?)
3. How to minimize cost, get most value for your company
. Some protections on your current policies
a. Gating elements - What the insurance companies want to see - how that might help costs
4. Best practices generally
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union.
CT, HI & VT - Oh My! What Do the Latest Privacy Regulations Mean to You?Resilient Systems
In the past few months privacy regs in Connecticut, Hawaii and Vermont have quietly been updated. Though not revolutionary changes, they are material as they raise the compliance bar.
This webinar will review the details of these regulatory updates and spell out what they can mean for affected organizations. It will include before and after comparisons to highlight what firms will need to do differently under the new regs. Legal, privacy, and compliance professionals won't want to miss this highly valuable webinar.
Our featured speakers for this timely Webinar are:
Colin Zick, Partner, Foley Hoag LLP
Co-Founder of Foley Hoag’s Data & Security Privacy Practice Group
Blogs at: www.securityprivacyandthelaw.com
Gant Redmon, Esq., General Counsel, Co3 Systems
CIPP/US
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Financial Poise
Technology is rapidly changing the way lawyers provide services. This is so especially in light of the Covid-19 pandemic, which creates new and different ethical challenges to confidentiality, cyber fraud and securing data, marketing and advertising concerns, and client communications. This webinar will address a myriad of new problems lawyers are facing and some practical suggestions and solutions that arise out of the changing manner and pace of the practice of law. This webinar will also cover several ABA Model Rules of Professional Conduct.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/best-practices-regarding-technology-2021/
Lost laptops, misplaced paper records, cyber theft - breaches are a fact of life. But they don't have to be a disaster. Breach veterans know that the impact of a data loss event is substantially determined by what happens in the 48 hours after you find out about it. Get things right, and even a substantial and public breach can be weathered gracefully. Mess things up, and a small breach can turn into a nightmare.
This webinar will review critical steps organizations can take in the wake of a breach. Our featured speaker will be privacy and compliance expert, Deb Hampson who is an AVP & Assistant General Counsel at The Hartford. Don't miss this opportunity to learn best practices from a proven professional.
Digital Information Law & Your Business - The Alternative BoardShawn Tuma
A discussion for business owners of digital information law issues of social media law, data security and data breach law, and trade secrets and corporate espionage issues.
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud SummitShawn Tuma
Shawn Tuma's presentation with Christopher Mitchell (of Crowe Horwath) at The Institute of Internal Auditors 9th Annual Fraud Summit. The title of the presentation is The Legal Side of Data Breach and Third Party Risk.
The main point of the presentation is that when a company is breached through the fault of one of its third-party business associates, or other third-parties, the company is still responsible for all of the repercussions arising out of the breach and, at best, will then have to go and pursue its rights against the third party. Thus, companies need to ensure that their business associates and other third parties adhere to proper data security practices and they should be audited to ensure compliance.
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union. http://www.nafcu.org/affinion
“Cyber Liability & Cyber Insurance” - A discussion on best practices around Prevention, Detection, and Response!
Sponsored by Datto and Webster Bank
Series brought to you by the Connecticut Technology Council.
____________
TOPIC FOCUS:
1. Evolution and acceptance of Cybersecurity insurance
a. Understanding risk & effect on businesses
i. Used to be major brands, now widespread.
ii. Risk recognized, business leaders looking to minimize risk
b. Describing changes in cybersecurity insurance
How coverages have evolved - not just for biggest companies
i. Insurers are working with (tech) companies to get it right
ii. Where is it going from here? Trends, specialty insurance
2. Describe insurance types/ specifics and how they perform when needed
. Not all policies are the same
a. What to look for
b. How they vary by type of business (Healthcare vs. Retail vs. Software Co.)
c. What gaps still remain (What can’t get covered?)
3. How to minimize cost, get most value for your company
. Some protections on your current policies
a. Gating elements - What the insurance companies want to see - how that might help costs
4. Best practices generally
Has your credit union considered how member relations, legal compliance and brand reputation might be affected during a data breach? In this 2012 NAFCU Technology & Security Conference session recording you will learn about the risks of data breaches and how they could impact your credit union.
CT, HI & VT - Oh My! What Do the Latest Privacy Regulations Mean to You?Resilient Systems
In the past few months privacy regs in Connecticut, Hawaii and Vermont have quietly been updated. Though not revolutionary changes, they are material as they raise the compliance bar.
This webinar will review the details of these regulatory updates and spell out what they can mean for affected organizations. It will include before and after comparisons to highlight what firms will need to do differently under the new regs. Legal, privacy, and compliance professionals won't want to miss this highly valuable webinar.
Our featured speakers for this timely Webinar are:
Colin Zick, Partner, Foley Hoag LLP
Co-Founder of Foley Hoag’s Data & Security Privacy Practice Group
Blogs at: www.securityprivacyandthelaw.com
Gant Redmon, Esq., General Counsel, Co3 Systems
CIPP/US
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Financial Poise
Technology is rapidly changing the way lawyers provide services. This is so especially in light of the Covid-19 pandemic, which creates new and different ethical challenges to confidentiality, cyber fraud and securing data, marketing and advertising concerns, and client communications. This webinar will address a myriad of new problems lawyers are facing and some practical suggestions and solutions that arise out of the changing manner and pace of the practice of law. This webinar will also cover several ABA Model Rules of Professional Conduct.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/best-practices-regarding-technology-2021/
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
ACI’s lauded Cyber & Data Risk Insurance conference is the highest-level event that provides maximum opportunities to learn from and network with underwriters, brokers, claims managers and industry leaders, and helps you keep pace with the ever-changing cyber insurance market. It’s also the only conference that brings you regulatory and enforcement priorities straight from the federal and state government themselves.
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
Shawn Tuma, Cybersecurity & Data Protection Partner at Scheef & Stone, L.L.P., presented to the Dallas Bar Association's Corporate Counsel Section on May 3, 2016. The title was Cybersecurity: What the GC and CEO Need to Know.
A hands-on cybersecurity presentation: preparing an action plan before you are attacked, contracting tips and available insurance coverage.
This presentation focuses to the rising prominence of insurance considerations—and more particularly—to legal aspects of insurance as it relates to cybersecurity and privacy.
The presentation defines "Cyber and Privacy Insurance” and organizes such insurance into four main types of cyber insurance coverage: data breach and privacy management coverage, multimedia liability coverage, extortion liability coverage, and network security liability coverage. With these definitions, the presentation then gives snapshot of how the Cyber Insurance Market Is Maturing, its participants, costs, and related attributes.
Consideration is given to the importance of defined terms, before launching into difficulties that providers and users have relative to measuring, modeling, and pricing cyber insurance risk. Particular attention is given to the language of “claims” and how to navigate through associated risk/cost analyses and cost structures.
Additionally, general considerations, pre-conditions, cost of compliance, business interruption, governing board oversight and related issues are brought together is a cohesive manner.
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
Invited speaker: "Growing Trend of Finding Regulatory and Tort Liability for Cyber Security Breaches ”
with Mark W. Ishman, J.D., Masters in Law in Information Technology and Privacy Law
Patrick Bourk, National Cyber Practice Leader from Hub International, discusses the various cyber policies available for mid size commercial businesses. He also showcases the various types of risk to consider when working with an insurer.
From the 2017 Intermountain CFO Summit. How do CFOs manage financial risk. What role does insurance play? This presentation is by a friend of the firm - Diversified Insurance