Navigating the Legal Aspects of Cyber Incidents: First Steps, Required Disclosures and Notifications, Avoiding Pitfalls
A live 90-minute CLE video webinar with interactive Q&A
This CLE webinar will discuss the legal risks posed by a cybersecurity or data breach incident. The panel will address the crucial immediate first steps for counsel when a client is the victim of a breach, best practices for guiding clients on their disclosure and notification requirements, and how to avoid common and not-so-common pitfalls.
Outline
- Overview: current cyber threat landscape
- The role of counsel when a cyber threat or incident occurs
- The need for incident response and data mapping programs before a breach occurs and the role these programs play in resolving a breach
- Initial incident response: containing the damage and preserving evidence related to the breach
- Protecting the attorney-client privilege and maintaining confidentiality with outside vendors when responding to a security incident
- The role of law enforcement and other regulators when a security incident occurs
- Reviewing incident response processes and ongoing monitoring after the incident is closed
- Examples of cyber incident responses that went wrong and the resulting costs to the organizations involved
- Other considerations and practice pointers
Benefits
The panel will address these and other key considerations:
- What is the current cyber threat landscape?
- Why is it important for organizations to have effective logging and data mapping in place before an incident occurs and how can these measures assist an organization in the event of a cyber incident?
- What are the key legal considerations organizations and counsel must keep in mind when responding to a cyber incident?
- How can counsel position their client as favorably as possible for potential government investigations or litigation when resolving the fallout of a breach?
Faculty
Christian M. Auty
Partner, U.S. Lead – Data Privacy and Security Team
Bryan Cave Leighton Paisner
Mr. Auty has led engagements with hundreds of companies in diverse industries. He works side-by-side with clients to... | Read More
Mr. Auty has led engagements with hundreds of companies in diverse industries. He works side-by-side with clients to navigate complex, intersecting data privacy and security regimes, including the California Consumer Privacy Act, the GDPR, HIPAA and the Gramm-Leach-Bliley Act. Mr. Auty also has significant experience responding to data breaches and defending privacy and security practices in investigations initiated by regulatory agencies around the world. He is a frequent writer and speaker on data privacy topics, in particular issues related to digital marketing.
CloseIan C. Ballon
Shareholder, Co-Chair Global Intellectual Property & Technology Practice Group
Greenberg Traurig
Mr. Ballon is an intellectual property and internet litigator. He represents clients in copyright, DMCA, trademark,... | Read More
Mr. Ballon is an intellectual property and internet litigator. He represents clients in copyright, DMCA, trademark, trade secret, right of publicity, privacy, security, software, database and internet- and mobile-related disputes and in the defense of data privacy, cybersecurity breach, adtech and behavioral advertising, TCPA and other internet-related class action suits. Mr. Ballon is the author of the five-volume legal treatise, E-Commerce and Internet Law: Treatise With Forms 2d Edition (West 2008 & 2022 Cum. Supp.)
CloseEarly Discount (through 12/13/24)