During this session, participants can expect to learn more about the incident response process, why it is important for practitioners to be aware of the risks associated with an incident, and why they should be proactive in preparing for an inevitable data security incident. This session will also focus on privilege issues stemming from data security incidents and how to properly engage service providers to assist in incident response, while maintaining privilege. Finally, this session will wrap up by walking participants through a case study/mini-table top exercise that illustrate some of the issues highlighted in the previous sections.
Key topics to be discussed:
What is Incident Response and Why It’s Important?
Best Practices of Maintaining Privilege
Best Practices of Engaging Service Providers
Case Study and Mini Table-Top
Date: July 21, 2022
Logan Parker | Bryan Cave Leighton Paisner
Logan Parker serves as a privacy advisor to business clients across a variety of industries and provides strategic and legal guidance on data privacy issues. He regularly counsels his clients on legal matters that include privacy, cybersecurity, technology, IT contracts, the internet, big data, and cross-border data transfers. He also serves as breach counsel for a wide variety of data security incidents and breaches, domestic and abroad, including business email compromises, ransomware attacks, wire frauds, and unauthorized and inadvertent disclosures.
Logan is a Certified Information Privacy Professional/United States by the International Association of Privacy Professionals and is certified in Healthcare Compliance by the Health Care Compliance Association and has a Yellow Belt with Legal Lean Sigma.
Robert S. Jett III | Crawford & Company
“Bob” serves as Chief Privacy Officer and lead IT counsel for Crawford & Company. He has experience as a legal advisor and in-house counsel with multi-national organizations in the medical device, insurance and financial services industry and has worked closely with colleagues and issues related to Information Technology, Data Privacy and Protection, Information Security and Corporate Compliance functions. This has included the creation, implementation and maintenance of global compliance, incident response and data privacy programs and managing a global privacy office for several global companies.
I. What is Incident Response and Why It’s Important? | 3:00 pm – 3:30 pm
II. Best Practices of Maintaining Privilege | 3:30 pm – 4:00 pm
Break | 4:00 pm – 4:10 pm
III. Best Practices of Engaging Service Providers | 4:10 pm – 4:40 pm
IV. Case Study and Mini Table-Top | 4:40 pm – 5:10 pm