Gislason & Hunter LLP and Eide Bailly invite you and your colleagues to attend a complimentary seminar on Data Privacy and Cybersecurity on Wednesday, October 30 at Edinburgh Golf Course.
This seminar will discuss the state and federal law requirements and proposed legislation in regard to data security. Legal and financial perspectives will be presented on:
- How to identify a security breach
- Common pitfalls when responding to a breech/incident
- Legal ramifications of a breach and protocols to put in place
- Financial ramifications of a breach and protocols to put in place
Participants will leave the seminar with the tools to put together a privacy and cybersecurity plan that includes insurance considerations, media plans and internal training programs.
AGENDA
8:00 – 8:30 am – Registration and Breakfast
8:30 am – 9:30 am – Why is it important?
- Example story about data privacy
- Example story about cyber security breach
- State and Federal law requirements and proposed legislation
9:30 – 9:40 am – Break
9:40 – 10:10 am – Data Privacy
- What “Personal Information” is protected
- Who must comply
- Disclosure requirements
- Prohibition/limitation on Data Sale: Opt-In / Opt-Out Right
- Data Access/Deletion rights
10:10 – 10:40 am – “It’s not if, but when it happens to you.”
- Common pitfalls when reacting to a breach/ incident
- Assess the situation
- Minimize the damage
- Gather forensic data from the affected system(s)
- Notify authorities
- The cost of a breech
- Things NOT to do
- Table cards that outline what a business owner can do today when it comes to being prepared for this type of business interruption
10:40 – 10:50 am – Break
10:50 – 11:30 am – Proactive Panel
- Discussion on ways to be proactive when it comes to cybersecurity:
- Security breach liability
- Generally recognized and accepted security standards
- Importance of having a plan
- Creating a play book
- Identifying critical assets
- Implementing appropriate administrative, technical, and physical safeguards to protect assets
- Insurance policies
- Types of plans to consider
- How to vet out insurance providers
- Data security policy in place/ legal authorizations needed to monitor user activity
- Chief Data Privacy/Security Officer
- Training and education for everyone
11:30 – 11:45 am – Q&A