Insights: Seminar

Order from Chaos: What to Do During and After a Breach

Event Description: This live session will walk through the discovery and remediation of a data breach from the technical, legal, and public relations perspectives, and provide techniques and tools to use during a breach (and before the next one).

Tentative Schedule:
8:00am to 9:30am – Workshop Tabletop Exercise
9:30am to 9:40am – Break
9:40am to 11:30am – Cont. Workshop Tabletop Exercise
11:30am to 12:30pm – Lunch
12:30pm to 1:30pm – Presentation
1:30pm to 2:30pm – Presentation
2:30pm to 2:40pm – Break
2:40pm to 3:40pm – Presentation
3:40pm to 4:00pm – Q&A

Learning Objectives:
• Discuss the legal protections for cybersecurity incident response
• Discuss critical communications during and after incident response
• Establish the framework for managing cybersecurity incident response
• Review of the best practices, tools, and techniques during incident response

Debbie Anglin has spent 25+ years in communications and PR. She is an APR accredited in public relations and the principal of Anglin PR. Over her career, she has responded to more than 100 crises, incidents, threats, breaches and other situations affecting insurance, banking, healthcare, energy, higher education, municipalities, transportation and other industries.

Calvin Weeks has 25+ years in the cybersecurity, incident response, and digital forensics. Calvin has secured top secret classified systems, responded to more than ten thousand incidents, and is a lead developer and instructor in cyber terrorism incident response. He is a Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Certified E-Discovery Specialists (CEDS), and EnCase Computer Forensics Examiner (EnCE).

Tom C. Vincent II has 20+ years in regulatory compliance, information security and privacy. Tom provides assistance to his clients with issues involving data security and privacy, including the establishment of cybersecurity programs, negotiation of appropriate protections for client information, breach identification and required reporting. He is both a Certified Regulatory Compliance Manager (CRCM) and Certified Information Privacy Professional/United States (CIPP/US).

CPE Information:
7 Credits
Field of Study: Information Technology
Delivery Method: Group Live 
Program Level: Basic
Prerequisites: None Required

Additional Information:
No prerequisites or advanced preparation required. For information regarding refund, complaint and program cancellation policies, please contact Jason McKeever at 701.476.8773.

CPE Sponsors

Latest Insights

December 11, 2018
Long-term employees sometimes don’t offer the security you think they do.
December 11, 2018
This video outlines key considerations for businesses as they work to comply with the new sales and use tax rules.
December 10, 2018
For most of November, the stock market was plagued by the same skepticism evident in October: the sense that corporate profits were declining and economic growth was slowing.
December 7, 2018
Just what is “comprehensive wealth planning?” As you invest and save for retirement, you will no doubt hear or read about it – but what does that phrase really mean? Just what does comprehensive wealth planning entail, and why do knowledgeable…
December 6, 2018
Paying off a major debt produces a sense of relief. You can celebrate a financial milestone; you can “pay yourself first” to greater degree and direct more money toward your dreams and your financial future rather than your creditors.
December 3, 2018
Flexibility is certainly an aspect of forensic accounting, but in ways many people and organizations overlook or perhaps are just unfamiliar with.
Find A Location