Cyber Security Risk Management
1h
Created on August 12, 2015
Beginner
Overview
In this session, DLA Piper’s Co-Chair of Global Privacy & Security, Jim Halpert, discusses the development of risk management plans for cyber security from initiation to completion. Jim begins by focusing on how to identify current internal processes, auditing those processes and implementing a plan. Next, he discusses different strategies that are employed, including board and enterprise wide governance. Jim concludes by discussing litigation and regulatory risk along with vendor risk management.
Learning Objectives:
I. Identify process control for governance and internal program documentation
II. Summarize data and system classification
III. Identify cyber security risk governance
IV. Describe risk assessments, analysis and management strategies
V. Weigh litigation and regulatory risk
VI. Summarize vendor risk management
Gain access to this course, plus unlimited access to 2000+ courses, with an Unlimited Subscription.
Explore Lawline Subscriptions