Responding to a Privacy Breach: Protect Yourself and Your Vendors
Responding to a Privacy Breach: Protect Yourself and Your Vendors
Privacy breaches can have devastating impact upon organizations if they do not respond to them well - and ensure that their third-party service providers are also adequately protected. Register for this webinar to learn:

  • Why there are more privacy breaches than ever before
  • How to plan for - and respond to - a breach
  • Steps to take to prevent another similar breach
  • Why organizations must ensure their vendors have plans for security incidents and privacy breaches

Background

Organizations must comply with at least 40 U.S. state-level privacy breach notification laws, and there are federal and international laws with notification requirements poised to be enacted in the near future. Privacy breaches can have devastating impact upon organizations if they do not respond to them well. Organizations must be prepared for the inevitable privacy breach that will occur to lessen the negative impact of such events.

In this webinar, noted privacy expert Rebecca Herold will discuss the different types of privacy breaches that continue to plague organizations and identify the commonalities. She will lead an important discussion about how information security, privacy and compliance professionals can work together to implement the processes to help prevent breaches, and also how to prepare an effective breach response and notification plan. She will discuss the different phases of a breach and the critical decisions that must be made during the privacy breach response. She will also discuss the need to include breach notice requirements within vendor and business partner contracts.

Rebecca Herold is an information privacy, security and compliance consultant, author and instructor with her own company since mid-2004, Rebecca Herold, LLC. She has over 16 years of privacy and information security experience, and assists organizations in all industries throughout the world with all aspects of their information privacy, security and regulatory compliance programs.



Around the Network