transcript   Transcript

Cybersecurity: Managing the Risk & Cyber Attack Simulation

Recorded on: Jun. 7, 2017
Running Time: 02:04:45

Full Transcript:



If you are a Privileged Member, just log in and start reading now! If you are not a Privileged Member, please click here to learn how unlimited access to PLI programs may be right for you and your firm.

To access the streaming media of this presentation, please purchase the corresponding seminar segment.

Taken from the Web Program Eighteenth Annual Institute on Privacy and Data Security Law recorded May, 2017 in New York.

Cybersecurity: Managing the Risk & Cyber Attack Simulation [02:04:45]
  • The critical role of the Board of Directors and C-suite in addressing cybersecurity risk
  • Proactive readiness activities
  • Cybersecurity insurance: the good, the bad and the ugly
  • Mock cybersecurity event to walk through each aspect of the incident
  • Managing a forensic investigation
  • The legal implications
(CFE Field of Study: Fraud)

Ryan Gibney, Paul H. Luehr, Lisa J. Sotto, Paul M. Tiao


The purchase price of this segment includes the following article from the Course Handbook available online:

  • Addressing Director Responsibilities for Data Security
    Thomas J. Smedinghoff
  • Privacy & Information Security Law Blog: Global Privacy and Cybersecurity Law Updates and Analysis—Update: Cybersecurity
    Lisa J. Sotto
  • How to Safeguard Privacy and Data Security in Corporate Transactions, Corporate Counsel (February 22, 2016)
    Ryan P. Logan, Lisa J. Sotto
  • SEC Cybersecurity Investigations: A How-to Guide, Westlaw Journal: Securities Litigation & Regulation—Volume 21, Issue 3 (June 11, 2015)
    Lisa J. Sotto, Scott H. Kimpel, Matthew P. Bosher
  • A How-To Guide to Information Security Breaches, BNA, Inc., Privacy & Security Law Report: Volume 6, No. 14, pp. 559–562 (April 2, 2007)
    Lisa J. Sotto, Aaron P. Simpson
  • Cybersecurity Risk Management
    Ryan Gibney
  • 20 Legal Items to Remember During and After Cyber Incident Response
    Edward R. McNicholas
  • 10 Key Steps for Lawyers to Prepare for a Cybersecurity Event
    Edward R. McNicholas

Presentation Material

  • The Role of the Board of Directors and C-Suite in Cybersecurity Preparedness
    Ryan Gibney, Paul M. Tiao
  • Cybersecurity: Managing the Risk Cyber Attack Simulation
    Paul H. Luehr, Lisa J. Sotto
(s)
Ryan Gibney ~ VP, Northeast Cyber Technology Practice Leader, Lockton Companies, LLC
Paul H Luehr ~ Faegre Baker Daniels LLP
Lisa J Sotto ~ Hunton & Williams LLP
Paul M Tiao ~ Hunton & Williams LLP
Share
Email
Transcript FAQ's
  • How Can I Access Transcripts?
    You must be a Member in good standing.

  • Can I access the Video?
    Yes, you can access the video if you have the Adobe Flash plugin installed. Click on the video camera icon when you mouse over each paragraph. The media will begin playback at that point.

  • Can I get CLE credit for reading the transcript?
    No, CLE credit cannot be earned for reading a transcript. CLE credit is issued only for verified attendance while watching a web program. If seeking credit, please verify the program's eligibility for credit and expiration date in your jurisdiction on the web segment launch page before commencing the program.

  • FOLLOW PLI:
  • twitter
  • LinkedIn
  • GooglePlus
  • RSS

All Contents Copyright © 1996-2017 Practising Law Institute. Continuing Legal Education since 1933.

© 2017 PLI PRACTISING LAW INSTITUTE. All rights reserved. The PLI logo is a service mark of PLI.