Interested in training for your team? Click here to learn more

Navigating the Legal Aspects of Cyber Incidents: First Steps, Required Disclosures and Notifications, Avoiding Pitfalls

A live 90-minute CLE video webinar with interactive Q&A

This program is included with the Strafford CLE Pass. Click for more information.
This program is included with the Strafford All-Access Pass. Click for more information.

Wednesday, January 8, 2025

1:00pm-2:30pm EST, 10:00am-11:30am PST

Early Registration Discount Deadline, Friday, December 13, 2024

or call 1-800-926-7926

This CLE webinar will discuss the legal risks posed by a cybersecurity or data breach incident. The panel will address the crucial immediate first steps for counsel when a client is the victim of a breach, best practices for guiding clients on their disclosure and notification requirements, and how to avoid common and not-so-common pitfalls.

Description

Cyber incidents and data breaches present a myriad of legal issues for clients across every industry. These issues are complex and overwhelming due to the ever-growing patchwork of breach notification requirements at the state, federal, and international level.

When a breach occurs, clients' key concerns are protecting their data and the company's interests, particularly their reputation. When advising an organization that is dealing with the fallout of a cyber incident, counsel must understand that the potential for investigations by government agencies and private lawsuits is high. Thus, counsel must position their client's response and resolution of the incident as favorably as possible while also preserving documents and managing communications and other potential evidence in anticipation of future investigations or litigation.

It is incredibly important for counsel to be involved early on when a breach occurs because many of the decisions an organization makes during the chaos of a cyber incident will have important legal implications down the road. Counsel must be strategic in preserving the attorney-client privilege and maintaining the confidentiality of service providers engaged to manage the cyber incident. Also, counsel plays a critical role after the resolution of an incident by assessing the effectiveness of the client's processes and programs to guard against the potential for future security incidents.

Listen as our authoritative panel provides guidance for advising and protecting clients on the legal implications of responding to a cyber incident or data breach. The panel will also highlight examples of cyber incident responses that went wrong and the resulting costs to the companies involved.

READ MORE

Outline

  1. Overview: current cyber threat landscape
  2. The role of counsel when a cyber threat or incident occurs
  3. The need for incident response and data mapping programs before a breach occurs and the role these programs play in resolving a breach
  4. Initial incident response: containing the damage and preserving evidence related to the breach
  5. Protecting the attorney-client privilege and maintaining confidentiality with outside vendors when responding to a security incident
  6. The role of law enforcement and other regulators when a security incident occurs
  7. Reviewing incident response processes and ongoing monitoring after the incident is closed
  8. Examples of cyber incident responses that went wrong and the resulting costs to the organizations involved
  9. Other considerations and practice pointers

Benefits

The panel will address these and other key considerations:

  • What is the current cyber threat landscape?
  • Why is it important for organizations to have effective logging and data mapping in place before an incident occurs and how can these measures assist an organization in the event of a cyber incident?
  • What are the key legal considerations organizations and counsel must keep in mind when responding to a cyber incident?
  • How can counsel position their client as favorably as possible for potential government investigations or litigation when resolving the fallout of a breach?

Faculty

Auty, Christian
Christian M. Auty

Partner, U.S. Lead – Data Privacy and Security Team
Bryan Cave Leighton Paisner

Mr. Auty has led engagements with hundreds of companies in diverse industries. He works side-by-side with clients to...  |  Read More

Ballon, Ian
Ian C. Ballon

Shareholder, Co-Chair Global Intellectual Property & Technology Practice Group
Greenberg Traurig

Mr. Ballon is an intellectual property and internet litigator. He represents clients in copyright, DMCA, trademark,...  |  Read More

Attend on January 8

Early Discount (through 12/13/24)

Cannot Attend January 8?

Early Discount (through 12/13/24)

You may pre-order a recording to listen at your convenience. Recordings are available 48 hours after the webinar. Strafford will process CLE credit for one person on each recording. All formats include course handouts.

To find out which recorded format will provide the best CLE option, select your state:

CLE On-Demand Video