In this session, DLA Piper’s Co-Chair of Global Privacy & Security, Jim Halpert, discusses the development of risk management plans for cyber security from initiation to completion. Jim begins by focusing on how to identify current internal processes, auditing those processes and implementing a plan. Next, he discusses different strategies that are employed, including board and enterprise wide governance. Jim concludes by discussing litigation and regulatory risk along with vendor risk management.
I. Identify process control for governance and internal program documentation
II. Summarize data and system classification
III. Identify cyber security risk governance
IV. Describe risk assessments, analysis and management strategies
V. Weigh litigation and regulatory risk
VI. Summarize vendor risk management
This presentation was outstanding.
This is the best cyber security program I have ever heard - it was actually interesting. Bravo!
Basic, but solid
Speaker was well prepared and materials were well-organized, presented.
Great presentation and yes it was very educational! Highly recommended.
Perhaps the strongest CLE I have viewed. Very knowledgeable instructor.
Very, very well-done! G
Timely and informative.
Useful info and insights.
I enjoyed this course and am currently working on a risk management and cybersecurity program and found this course to be a good high-level summary of all the considerations that need to be taken into account.
Very interesting speaker and excellent coverage of the topic.
Really enjoyed this one.
Good introduction for a newbie like myself!
much more interesting speaker than the average in this area
relevant and timely
Very knowledgeable on the subject matter. I learned a great deal.
Great instructor, great info.
Alot of useful information in too short of time.
Good reference for corporate counsel.
Very instructive and informative.