Insights: Recorded Webinar

Security Issues for Client Information and the Clients that Provide It

Safety in Numbers

August 14, 2018

Service firms that handle client information have particular responsibilities to protect that information—protection that can be strengthened if the firm’s clients are protected as well. We’ll discuss particular protections required for different types of client information and ways to assist clients with their own protections.

Learning Objectives:

  • Discuss your obligations to protect client information and data
  • Discuss your client’s responsibility to protect information
  • Determine how to communicate security and awareness issues with your client
  • Discuss ways to educate your client on vital security best practices to protect them and you

Speakers:
Debbie Anglin has spent 25+ years in communications and PR. She is an APR accredited in public relations and the principal of Anglin PR. Over her career, she has responded to more than 100 crises, incidents, threats, breaches and other situations affecting insurance, banking, healthcare, energy, higher education, municipalities, transportation and other industries.

Calvin Weeks has 25+ years in the cybersecurity, incident response, and digital forensics. Calvin has secured top secret classified systems, responded to more than ten thousand incidents, and is a lead developer and instructor in cyber terrorism incident response. He is a Certified Information Security Manager (CISM), Certified Information System Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Certified E-Discovery Specialists (CEDS), and EnCase Computer Forensics Examiner (EnCE).

Tom C. Vincent II has 20+ years in regulatory compliance, information security and privacy. Tom provides assistance to his clients with issues involving data security and privacy, including the establishment of cybersecurity programs, negotiation of appropriate protections for client information, breach identification and required reporting. He is both a Certified Regulatory Compliance Manager (CRCM) and Certified Information Privacy Professional/United States (CIPP/US).


Latest Insights

August 3, 2018
Article
It should come as no surprise that we’re pretty big fans of the cloud, it’s the obvious next step for businesses looking to upgrade their systems, and a smart choice for those with limited IT staff or internal resources.
June 14, 2018
Article
It is not to say that well run companies do not get breached, but all indicators lead to the conclusion that if certain things are done from the top down, the effects and cost of defending your company against data breaches, and recovering from a…
June 12, 2018
Recorded Webinar
While your company may be secure, can you say the same about your vendors? In this session we’ll discuss different techniques for performing appropriate due diligence, negotiating the right terms in your vendor agreements, and monitoring vendors for…
May 21, 2018
Article
Whether it be accidentally or on purpose we have all deleted a file. But what happens when you need it back? To find this out and understand how forensic examiners are able to find this information, we will discuss how data is stored, what happens…
April 19, 2018
Firm News
Two of the major players in NetSuite consulting, sales, and implementations are coming together to offer businesses flexible, comprehensive technology solutions that will grow with their evolving needs.
December 13, 2017
Video
Just because it’s almost 2018 doesn’t mean that your tech decisions have suddenly become crystal clear. You may have heard all the buzz around the cloud being the smart choice for businesses today, but what exactly is cloud computing? What makes the…
October 2, 2017
Firm News
Technology consulting company Spring2 Technologies of Sandy, Utah, has become part of Eide Bailly LLP, a regional CPA and business advisory firm, effective today.
September 14, 2017
Article
The recent data security breach of credit monitoring service Equifax shows how immense and devastating a cyber attack can be. The breach exposed personal and credit card information for as many as 143 million people and will have long-lasting…
September 7, 2017
Article
When it comes to cybersecurity, there are many approaches and tactics to consider. Keeping your software and systems up to date is a very important item to prioritize. Read on for a few things to keep in mind when deciding if and when to apply a…
Find A Location