This course is no longer available for credit on our site. Here are some similar courses you might be interested in:
In this session, DLA Piper’s Co-Chair of Global Privacy & Security, Jim Halpert, discusses the development of risk management plans for cyber security from initiation to completion. Jim begins by focusing on how to identify current internal processes, auditing those processes and implementing a plan. Next, he discusses different strategies that are employed, including board and enterprise wide governance. Jim concludes by discussing litigation and regulatory risk along with vendor risk management.
I. Identify process control for governance and internal program documentation
II. Summarize data and system classification
III. Identify cyber security risk governance
IV. Describe risk assessments, analysis and management strategies
V. Weigh litigation and regulatory risk
VI. Summarize vendor risk management
Jim Halpert advises clients regarding compliance strategies for and transactions relating to transnational, federal and state security and privacy regulations, industry best practices and self-regulatory initiatives, and has represented clients in major security and privacy cases in the federal courts and before the Federal Trade Commission.
Jim represents companies on a broad range of data management issues, including cyber and data security, cloud agreements, managing privacy class action risks, trans-national data flows, navigating difficult conflicts between foreign privacy laws and US compliance obligations, regulation of advertising and marketing practices, healthcare and financial privacy, children's and student privacy, privacy regulation of communications media, employee data, due diligence in sales of corporate assets, records management and responses to government surveillance requests. He has extensive experience with European, Asian and Latin American privacy regimes, and regularly leads teams across DLA Piper's global network advising on complex international security and privacy matters.
This presentation was outstanding.
This is the best cyber security program I have ever heard - it was actually interesting. Bravo!
Basic, but solid
Speaker was well prepared and materials were well-organized, presented.
Great presentation and yes it was very educational! Highly recommended.
Perhaps the strongest CLE I have viewed. Very knowledgeable instructor.
Very, very well-done! G
Timely and informative.
Useful info and insights.
I enjoyed this course and am currently working on a risk management and cybersecurity program and found this course to be a good high-level summary of all the considerations that need to be taken into account.
Very interesting speaker and excellent coverage of the topic.
Really enjoyed this one.
Good introduction for a newbie like myself!
much more interesting speaker than the average in this area
relevant and timely
Very knowledgeable on the subject matter. I learned a great deal.
Great instructor, great info.
Alot of useful information in too short of time.
Good reference for corporate counsel.
Very instructive and informative.
Unlimited CLE Subscription gives you access to take almost any course from our catalog and earn as much CLE credit as you need.