SlideShare a Scribd company logo
1 of 10
Click to edit Master title style
6/3/2015 1
The Life Cycle
of a Data
Breach
Frontier
Communications
June 3, 2015
Sponsored by:
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Presented by
Bruce Carlson
President & CEO
Connecticut Technology Council
Introduction
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Presented by
Ken Arndt
East Region President
Frontier Communications
Welcome
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
Keynote Speaker:
CT Attorney General
George Jepsen
To discuss the state’s cybersecurity efforts
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d
b y
Patricia Fisher
President & CEO, JANUS Associates
Board Member, CTC
Chair, CTC Cybersecurity Task Force
Introduction of Panelists
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d
b y
Q&A Panelists
Steven J. Bonafonte
Attorney, Pullman & Comley; Chair of the firm’s Cybersecurity, Privacy &
Infrastructure practice group; member of the firm’s corporate and business
department.
Gary Cuozzo
Owner at ISG Software Group, LLC
Michele Lucan
Assistant Attorney General, State of CT
Moderator: Patricia Fisher
President & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
© 2015 Pullman & Comley LLC7
Life Cycle Of A Data Breach
How To React, Repair, & Resume
Discover
Breach
Investigate
&
Remediate
Assemble
Internal
Response
Team
Contact Law
Enforcement
(If applicable)
Convene
Third-Party
Consultants
Begin
Notificatio
n Process
Consider PR
implications
and strategy for
response
Mail/Email
Notifications
Respond
To
Inquiries
Post-Breach
Debriefing
and Risk
Mitigation
Resume
Business
“as usual”
Life Cycle
Of A
Data Breach
1
2
3
4
5
67
8
9
10
11
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d b y
Q&A Panelists
Steven J. Bonafonte
co-chair of Pullman & Comley’s Cybersecurity, Privacy & Infrastructure
practice group and a member of the firm’s corporate and business
department.
Gary Cuozzo
Owner at ISG Software Group, LLC
Michele Lucan
Assistant Attorney General, State of CT
Moderator: Patricia Fisher
President & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d
b y
Bruce Carlson
President & CEO
CT Technology Council
Patricia Fisher
President & CEO
JANUS Associates, Inc.
Nancy Hancock
Partner
Pullman and Comley LLC
Richard Harris
Partner
Day Pitney LLP
Rick Huebner
President & CEO
Visual Technologies, Inc.
Lyle Liberman
COO
JANUS Associates, Inc.
Andy McCarthy
VP of Engineering &
Technical Ops,
Western NE Region
Comcast
Suzanne Novak
Owner/President
ERUdyne. LLC
Dr. Leon Pintsov
CEO
SignitSure Inc.
Paige Rasid
COO
CT Technology Council
Ray Umerley
Vice President
Chief Data Protection
Officer, Pitney Bowes
Ron Vernier
SVP and CIO
Hartford Steam Boiler
C y b e r s e c u r i t y Ta s k F o rc e
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
When: September 30 | 8:30am – 10:30am
Where: Goodwin College | East Hartford
Cost: $25 CTC Members | $35 Non-members
$40 at the door
Upcoming Seminar
Sponsored by:

More Related Content

What's hot

New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...NationalUnderwriter
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
TechAssure Presentation PDF linkedin
TechAssure Presentation PDF linkedinTechAssure Presentation PDF linkedin
TechAssure Presentation PDF linkedinBrian D. Brown
 
Newsletter 0021309 A0550983
Newsletter 0021309  A0550983 Newsletter 0021309  A0550983
Newsletter 0021309 A0550983 Todd Ruback
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityShawn Tuma
 
Lobbying For Success Lpga
Lobbying For Success   LpgaLobbying For Success   Lpga
Lobbying For Success LpgaDanielpaul
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Shawn Tuma
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsShawn Tuma
 
Internet Liabilities Presentation
Internet Liabilities PresentationInternet Liabilities Presentation
Internet Liabilities PresentationShannon Evans
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Shawn Tuma
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 

What's hot (20)

New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
TechAssure Presentation PDF linkedin
TechAssure Presentation PDF linkedinTechAssure Presentation PDF linkedin
TechAssure Presentation PDF linkedin
 
Newsletter 0021309 A0550983
Newsletter 0021309  A0550983 Newsletter 0021309  A0550983
Newsletter 0021309 A0550983
 
Lawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for CybersecurityLawyers' Ethical Obligations for Cybersecurity
Lawyers' Ethical Obligations for Cybersecurity
 
Lobbying For Success Lpga
Lobbying For Success   LpgaLobbying For Success   Lpga
Lobbying For Success Lpga
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business ClientsCyber Security for Your Clients: Business Lawyers Advising Business Clients
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
 
Legal Implications of a Cyber Attack
Legal Implications of a Cyber AttackLegal Implications of a Cyber Attack
Legal Implications of a Cyber Attack
 
Internet Liabilities Presentation
Internet Liabilities PresentationInternet Liabilities Presentation
Internet Liabilities Presentation
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 

Viewers also liked

CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Paige Rasid
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-programPaige Rasid
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech Paige Rasid
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 

Viewers also liked (6)

CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13Manufacturing Value, A CVG Second Thursday Event, 10/10/13
Manufacturing Value, A CVG Second Thursday Event, 10/10/13
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech September 2014 | Social Media and Mobile Tech
September 2014 | Social Media and Mobile Tech
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 

Similar to Life Cycle of a Data Breach - Cybersecurity Seminar Series

March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
June 2016 cybersecurityseminarseries final
June 2016 cybersecurityseminarseries finalJune 2016 cybersecurityseminarseries final
June 2016 cybersecurityseminarseries finalCourtney King
 
youth safety on a living internet
youth safety on a living internetyouth safety on a living internet
youth safety on a living internetBoni
 
YOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETYOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETBoni
 
Reduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting Coalition
Reduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting CoalitionReduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting Coalition
Reduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting CoalitionChristian Dawson
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Report to the President and Congress Ensuring Leadership in Federally Funded ...
Report to the President and Congress Ensuring Leadership in Federally Funded ...Report to the President and Congress Ensuring Leadership in Federally Funded ...
Report to the President and Congress Ensuring Leadership in Federally Funded ...Ed Dodds
 
Guidance for Boards of Directorsand Executive Manageme.docx
Guidance for Boards of Directorsand Executive Manageme.docxGuidance for Boards of Directorsand Executive Manageme.docx
Guidance for Boards of Directorsand Executive Manageme.docxwhittemorelucilla
 
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...ARMA International
 
Alphabet Soup: Professional Development Pathways in RIM/InfoGov/Privacy - IN...
Alphabet Soup:  Professional Development Pathways in RIM/InfoGov/Privacy - IN...Alphabet Soup:  Professional Development Pathways in RIM/InfoGov/Privacy - IN...
Alphabet Soup: Professional Development Pathways in RIM/InfoGov/Privacy - IN...Nick Inglis
 
Arthur recommendation letter
Arthur recommendation letterArthur recommendation letter
Arthur recommendation letterBrian Smith
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsEthisphere
 
LAC15032_WBINQ_Legal_Tech_Toronto
LAC15032_WBINQ_Legal_Tech_TorontoLAC15032_WBINQ_Legal_Tech_Toronto
LAC15032_WBINQ_Legal_Tech_TorontoPatrick Crummey
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Shawn Tuma
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Programsvito
 
Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...Mansoor Faridi, CISA
 
The Top Five Things You Need to Conduct Better eDiscovery
The Top Five Things You Need to Conduct Better eDiscoveryThe Top Five Things You Need to Conduct Better eDiscovery
The Top Five Things You Need to Conduct Better eDiscoveryESI Attorneys LLC
 

Similar to Life Cycle of a Data Breach - Cybersecurity Seminar Series (20)

ERM Symposium Agenda FINAL
ERM Symposium Agenda FINALERM Symposium Agenda FINAL
ERM Symposium Agenda FINAL
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
June 2016 cybersecurityseminarseries final
June 2016 cybersecurityseminarseries finalJune 2016 cybersecurityseminarseries final
June 2016 cybersecurityseminarseries final
 
youth safety on a living internet
youth safety on a living internetyouth safety on a living internet
youth safety on a living internet
 
YOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNETYOUTH SAFETY ON A LIVING INTERNET
YOUTH SAFETY ON A LIVING INTERNET
 
Reduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting Coalition
Reduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting CoalitionReduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting Coalition
Reduce Fraud and Liabilty: Tactics, Tech, and the Save Hosting Coalition
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
Report to the President and Congress Ensuring Leadership in Federally Funded ...
Report to the President and Congress Ensuring Leadership in Federally Funded ...Report to the President and Congress Ensuring Leadership in Federally Funded ...
Report to the President and Congress Ensuring Leadership in Federally Funded ...
 
Guidance for Boards of Directorsand Executive Manageme.docx
Guidance for Boards of Directorsand Executive Manageme.docxGuidance for Boards of Directorsand Executive Manageme.docx
Guidance for Boards of Directorsand Executive Manageme.docx
 
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
Matt Blaine, Dennis Garcia, Ann Gorr, & Donald Knight - #InfoGov17 - Navigati...
 
Alphabet Soup: Professional Development Pathways in RIM/InfoGov/Privacy - IN...
Alphabet Soup:  Professional Development Pathways in RIM/InfoGov/Privacy - IN...Alphabet Soup:  Professional Development Pathways in RIM/InfoGov/Privacy - IN...
Alphabet Soup: Professional Development Pathways in RIM/InfoGov/Privacy - IN...
 
Ceo letter to governor in support of sb 1161
Ceo letter to governor in support of sb 1161Ceo letter to governor in support of sb 1161
Ceo letter to governor in support of sb 1161
 
Arthur recommendation letter
Arthur recommendation letterArthur recommendation letter
Arthur recommendation letter
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data Threats
 
OOO
OOOOOO
OOO
 
LAC15032_WBINQ_Legal_Tech_Toronto
LAC15032_WBINQ_Legal_Tech_TorontoLAC15032_WBINQ_Legal_Tech_Toronto
LAC15032_WBINQ_Legal_Tech_Toronto
 
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud ...
 
CES Government 2011 Program
CES Government 2011 ProgramCES Government 2011 Program
CES Government 2011 Program
 
Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...Comparative Analysis of Information Security Management System Standards - Si...
Comparative Analysis of Information Security Management System Standards - Si...
 
The Top Five Things You Need to Conduct Better eDiscovery
The Top Five Things You Need to Conduct Better eDiscoveryThe Top Five Things You Need to Conduct Better eDiscovery
The Top Five Things You Need to Conduct Better eDiscovery
 

More from Paige Rasid

Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramPaige Rasid
 
Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementPaige Rasid
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and SecurityPaige Rasid
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 ProgramPaige Rasid
 
2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards Paige Rasid
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventPaige Rasid
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 ProgramPaige Rasid
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015Paige Rasid
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industryPaige Rasid
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy AgendaPaige Rasid
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit ProgramPaige Rasid
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Paige Rasid
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Paige Rasid
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money treePaige Rasid
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 Paige Rasid
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology CouncilPaige Rasid
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Paige Rasid
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13Paige Rasid
 

More from Paige Rasid (20)

Women Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event ProgramWomen Of Innovation® 2016 Honoree Bios & Event Program
Women Of Innovation® 2016 Honoree Bios & Event Program
 
Keeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor ManagementKeeping Control: Data Security and Vendor Management
Keeping Control: Data Security and Vendor Management
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
2015 Marcum TT40 Program
2015 Marcum TT40 Program2015 Marcum TT40 Program
2015 Marcum TT40 Program
 
2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards 2015 Marcum Tech Top 40 Awards
2015 Marcum Tech Top 40 Awards
 
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor EventSocial Media & Mobile Tech - CVG Entrepreneur and Investor Event
Social Media & Mobile Tech - CVG Entrepreneur and Investor Event
 
Women of Innovation 2015 Program
Women of Innovation 2015 ProgramWomen of Innovation 2015 Program
Women of Innovation 2015 Program
 
CVG - Medical Devices 2015
CVG - Medical Devices 2015CVG - Medical Devices 2015
CVG - Medical Devices 2015
 
Impact of IT on the healthcare industry
Impact of IT on the healthcare industryImpact of IT on the healthcare industry
Impact of IT on the healthcare industry
 
Public Policy Agenda
Public Policy AgendaPublic Policy Agenda
Public Policy Agenda
 
2014 Innovation Summit Program
2014 Innovation Summit Program2014 Innovation Summit Program
2014 Innovation Summit Program
 
Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014Marcum TT40 Presentation 2014
Marcum TT40 Presentation 2014
 
Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014Marcum Tech Top 40 Program 2014
Marcum Tech Top 40 Program 2014
 
Q2 2014 shaking the money tree
Q2 2014 shaking the money treeQ2 2014 shaking the money tree
Q2 2014 shaking the money tree
 
CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014 CVG - Education Technology Software - Second Thursday Event - July 2014
CVG - Education Technology Software - Second Thursday Event - July 2014
 
2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council2014 Women of Innovation(r) presented by the Connecticut Technology Council
2014 Women of Innovation(r) presented by the Connecticut Technology Council
 
Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13Private Investment in CT, A CVG Second Thursday, 11/14/13
Private Investment in CT, A CVG Second Thursday, 11/14/13
 
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
The Clean Tech Funding Roller Coaster - A CVG Second Thursday Event, 9/12/13
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Life Cycle of a Data Breach - Cybersecurity Seminar Series

  • 1. Click to edit Master title style 6/3/2015 1 The Life Cycle of a Data Breach Frontier Communications June 3, 2015 Sponsored by:
  • 2. Top Five Things You Can Do to Protect Your Clients and Your Business UCONN Stamford March 30, 2015 Presented by Bruce Carlson President & CEO Connecticut Technology Council Introduction
  • 3. Top Five Things You Can Do to Protect Your Clients and Your Business UCONN Stamford March 30, 2015 Presented by Ken Arndt East Region President Frontier Communications Welcome
  • 4. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by Keynote Speaker: CT Attorney General George Jepsen To discuss the state’s cybersecurity efforts
  • 5. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y Patricia Fisher President & CEO, JANUS Associates Board Member, CTC Chair, CTC Cybersecurity Task Force Introduction of Panelists
  • 6. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y Q&A Panelists Steven J. Bonafonte Attorney, Pullman & Comley; Chair of the firm’s Cybersecurity, Privacy & Infrastructure practice group; member of the firm’s corporate and business department. Gary Cuozzo Owner at ISG Software Group, LLC Michele Lucan Assistant Attorney General, State of CT Moderator: Patricia Fisher President & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
  • 7. © 2015 Pullman & Comley LLC7 Life Cycle Of A Data Breach How To React, Repair, & Resume Discover Breach Investigate & Remediate Assemble Internal Response Team Contact Law Enforcement (If applicable) Convene Third-Party Consultants Begin Notificatio n Process Consider PR implications and strategy for response Mail/Email Notifications Respond To Inquiries Post-Breach Debriefing and Risk Mitigation Resume Business “as usual” Life Cycle Of A Data Breach 1 2 3 4 5 67 8 9 10 11
  • 8. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y Q&A Panelists Steven J. Bonafonte co-chair of Pullman & Comley’s Cybersecurity, Privacy & Infrastructure practice group and a member of the firm’s corporate and business department. Gary Cuozzo Owner at ISG Software Group, LLC Michele Lucan Assistant Attorney General, State of CT Moderator: Patricia Fisher President & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
  • 9. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y Bruce Carlson President & CEO CT Technology Council Patricia Fisher President & CEO JANUS Associates, Inc. Nancy Hancock Partner Pullman and Comley LLC Richard Harris Partner Day Pitney LLP Rick Huebner President & CEO Visual Technologies, Inc. Lyle Liberman COO JANUS Associates, Inc. Andy McCarthy VP of Engineering & Technical Ops, Western NE Region Comcast Suzanne Novak Owner/President ERUdyne. LLC Dr. Leon Pintsov CEO SignitSure Inc. Paige Rasid COO CT Technology Council Ray Umerley Vice President Chief Data Protection Officer, Pitney Bowes Ron Vernier SVP and CIO Hartford Steam Boiler C y b e r s e c u r i t y Ta s k F o rc e
  • 10. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by When: September 30 | 8:30am – 10:30am Where: Goodwin College | East Hartford Cost: $25 CTC Members | $35 Non-members $40 at the door Upcoming Seminar Sponsored by: