Insights: Seminar

Order from Chaos: What to Do During and After a Breach

Event Description: This live session will walk through the discovery and remediation of a data breach from the technical, legal, and public relations perspectives, and provide techniques and tools to use during a breach (and before the next one).

Tentative Schedule:
8:00am to 9:30am – Workshop Tabletop Exercise
9:30am to 9:40am – Break
9:40am to 11:30am – Cont. Workshop Tabletop Exercise
11:30am to 12:30pm – Lunch
12:30pm to 1:30pm – Presentation
1:30pm to 2:30pm – Presentation
2:30pm to 2:40pm – Break
2:40pm to 3:40pm – Presentation
3:40pm to 4:00pm – Q&A

Learning Objectives:
• Discuss the legal protections for cybersecurity incident response
• Discuss critical communications during and after incident response
• Establish the framework for managing cybersecurity incident response
• Review of the best practices, tools, and techniques during incident response

Debbie Anglin has spent 25+ years in communications and PR. She is an APR accredited in public relations and the principal of Anglin PR. Over her career, she has responded to more than 100 crises, incidents, threats, breaches and other situations affecting insurance, banking, healthcare, energy, higher education, municipalities, transportation and other industries.

Calvin Weeks has 25+ years in the cybersecurity, incident response, and digital forensics. Calvin has secured top secret classified systems, responded to more than ten thousand incidents, and is a lead developer and instructor in cyber terrorism incident response. He is a Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Certified E-Discovery Specialists (CEDS), and EnCase Computer Forensics Examiner (EnCE).

Tom C. Vincent II has 20+ years in regulatory compliance, information security and privacy. Tom provides assistance to his clients with issues involving data security and privacy, including the establishment of cybersecurity programs, negotiation of appropriate protections for client information, breach identification and required reporting. He is both a Certified Regulatory Compliance Manager (CRCM) and Certified Information Privacy Professional/United States (CIPP/US).

CPE Information:
7 Credits
Field of Study: Information Technology
Delivery Method: Group Live 
Program Level: Basic
Prerequisites: None Required

Additional Information:
No prerequisites or advanced preparation required. For information regarding refund, complaint and program cancellation policies, please contact Jason McKeever at 701.476.8773.

CPE Sponsors

Latest Insights

October 19, 2018
While the focus of your practice will always be providing exceptional care for your patients, there is no way to get around the demands of running the business of the practice.
October 19, 2018
Is it time to review your policy? Life insurance is hard. It’s hard to know if you have the right kind. It’s hard to know if you have enough. And it’s hard to know if you need any at all. The insurance companies have made it even…
October 18, 2018
Cash basis producers have an opportunity to make contributions of raised commodities directly to a charitable organization. The fair market value of the gifted commodity is excluded from taxable income of the donor, resulting in the potential for…
October 17, 2018
If you finance a car, house, education or vacation, or if you borrow money for an investment, you probably pay or accrue interest for the use of the money you borrowed. The question then becomes, “is that interest deductible for tax purposes?”
October 17, 2018
In today’s world, every household decision raises issues about money. Whether you are paying holiday credit card bills, selecting employer benefits for 2019 or determining what amount you should be saving for retirement, they all have an effect on…
October 15, 2018
The IRS released clarification on the deductibility of meal and entertainment expenses for business purposes.
Find A Location