Webcast

Data Security Incident Response: Mitigating Escalating Risks

Streams live on Monday, March 23, 2020 at 11:30am EDT

$ 59 Business, Corporate, & Securities Law and Privacy & Cybersecurity In Stock
Get started now

$299 / year - Access to this Course and 1,500+ Lawline courses

or

Course Information

Time 60 Minutes
Difficulty Intermediate

Course Description

As massive data breaches make headlines and many states are enacting more stringent data privacy and security laws, in-house counsel and other attorneys need to be aware of the cyber-security threats to companies’ data and their legal obligations under international, federal, and state law. This presentation will discuss data security incident trends, the legal landscape of the state, federal, and international data privacy and security laws, recent regulatory enforcement actions, and best practices in mitigating risks from data breach incidents.


Learning Objectives:

  1. Examine the latest cyber attack trends
  2. Discuss the evolving threat landscape, including new lines of attack, the role of ransomware, and vulnerabilities
  3. Review the legal landscape of state, federal, and international data privacy and security laws
  4. Assess the costs of cyber-attack fallout, from physical damage to assets and intellectual property losses to legal fees and remediation expenses
  5. Identify the steps organizations can take to better manage these cyber-security risks and mitigate the impact of a cyber-attack 

Credit Information

After completing this course, Lawline will report your attendance information to {{ accredMasterState.state.name }}. Please ensure your license number is filled out in your profile to ensure timely reporting. For more information, see our {{ accredMasterState.state.name }} CLE Requirements page . After completing this course, {{ accredMasterState.state.name }} attorneys self-report their attendance and CLE compliance. For more information on how to report your CLE courses, see our {{ accredMasterState.state.name }} CLE Requirements FAQ .

Faculty

Sara Goldstein

BakerHostetler

Sara Goldstein focuses her practice on legal issues related to privacy and data protection. As the former vice president and general counsel of a large provider of release of information and disclosure management services, Sara was responsible for overseeing all of the company’s legal and compliance-related matters. This experience gives her a depth of knowledge regarding her clients’ needs, bringing a business-oriented perspective to her practice and allowing her to provide legal guidance that is realistic and practical for her clients. 

Sara has authored a variety of industry-related articles in publications such as the Journal of the American Health Information Management Association(AHIMA), The Group Practice JournalCompliance Today and RACMonitor.com. She has been invited to speak to organizations across the country about release of information, compliance with federal and state medical privacy laws, and breach prevention. She is also an adjunct professor of law at Drexel University, where she teaches a course on HIPAA and patient privacy.



Anthony P. Valach

Baker & Hostetler LLP

The interest in technology that led Anthony Valach to an engineering degree now inspires a dedicated approach to his privacy and data protection practice. He advises clients on data breach response, risk management and litigation issues associated with an incident, and strategic methods to avoid future harm. As the former General Counsel and Vice President of Operations for a leading information technology managed service provider, as well as the Chief Information Security Officer for a mid-sized, regional law firm, Anthony is well versed in both developing and overseeing compliance with information security policies and procedures.  

That experience, combined with a background in complex litigation, provides him with real-world insight on security concerns

Experience.

  • Coordinated network security and monitoring, data breach response, disaster recovery, HIPAA compliance and more for a leading information technology managed service provider.
  • Developed strategies to analyze complex electronically stored information (ESI) to uncover patterns of conduct and fraudulent activity.
  • Coordinated data breach response and implemented cybersecurity initiatives for a large construction equipment company.
  • Coordinated data breach response and implemented cybersecurity initiatives for an industrial company.