Gislason & Hunter LLP and Eide Bailly invite you and your colleagues to attend a complimentary seminar on Data Privacy and Cybersecurity on Tuesday, October 29 at Country Inn & Suites.
This seminar will discuss the state and federal law requirements and proposed legislation in regard to data security. Legal and financial perspectives will be presented on:
- How to identify a security breach
- Common pitfalls when responding to a breech/incident
- Legal ramifications of a breach and protocols to put in place
- Financial ramifications of a breach and protocols to put in place
Participants will leave the seminar with the tools to put together a privacy and cybersecurity plan that includes insurance considerations, media plans and internal training programs.
AGENDA
8:00 – 8:30 am – Registration and Breakfast
8:30 am – 9:30 am – Why is it important?
- Example story about data privacy
- Example story about cyber security breach
- State and Federal law requirements and proposed legislation
9:30 – 9:40 am – Break
9:40 – 10:10 am – Data Privacy
- What “Personal Information” is protected
- Who must comply
- Disclosure requirements
- Prohibition/limitation on Data Sale: Opt-In / Opt-Out Right
- Data Access/Deletion rights
10:10 – 10:40 am – “It’s not if, but when it happens to you.”
- Common pitfalls when reacting to a breach/ incident
- Assess the situation
- Minimize the damage
- Gather forensic data from the affected system(s)
- Notify authorities
- The cost of a breech
- Things NOT to do
- Table cards that outline what a business owner can do today when it comes to being prepared for this type of business interruption
10:40 – 10:50 am – Break
10:50 – 11:30 am – Proactive Panel
- Discussion on ways to be proactive when it comes to cybersecurity:
- Security breach liability
- Generally recognized and accepted security standards
- Importance of having a plan
- Creating a play book
- Identifying critical assets
- Implementing appropriate administrative, technical, and physical safeguards to protect assets
- Insurance policies
- Types of plans to consider
- How to vet out insurance providers
- Data security policy in place/ legal authorizations needed to monitor user activity
- Chief Data Privacy/Security Officer
- Training and education for everyone
11:30 – 11:45 am – Q&A