Training

Governance , Incident & Breach Response , Next-Generation Technologies & Secure Development

Data Breach Battle Plans for Financial Services

Data Breach Battle Plans for Financial Services

"You're going to be hacked so have a plan" - a warning from the FBI's Cyber division, highlighting the risk organizations face from a single lapse in their data security. While high-profile breaches within financial services have not occurred as frequently as within healthcare and other sector, the risks are just as palpable.

Register for this webinar and hear first-hand from Stephen Treglia, Legal Counsel at Absolute Software and former Assistant DA, Chief, Technology Crime Unit in New York, about:

  • How you can reduce non-compliance penalties by proving to auditors that you had strong security processes in place BEFORE a breach occurred;
  • Why every data breach to-date has been settled out of court;
  • Technical options that exist that could allow you to minimize - or even avoid - damaging outcomes.

Background

Whether it's a violation of Sarbanes Oxley, Gramm-Leach-Bliley or a State breach notification law, a data breach can have substantial legal and financial consequences. All it takes is a single security lapse and the next thing you know, you're trending on Twitter (not in a good way), and your CEO is resigning.

Although high profile breaches within Financial Services have not occurred as frequently as within Healthcare and other segments, according to the FBI's Cyber division, "you're going to be hacked so have a plan."

Join Stephen Treglia, Legal Counsel at Absolute Software and former Assistant DA, Chief, Technology Crime Unit in New York for an insightful session on data security readiness and the regulatory landscape for financial services organizations. Topics include:

  • How you can reduce non-compliance penalties by proving to auditors that you had strong security processes in place BEFORE the security incident occurred;
  • Why every data breach to-date has been settled out of court;
  • Technical options that exist that could allow you to minimize - or even avoid - damaging outcomes;
  • Additional vulnerabilities you should consider when responding to a security incident.

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.