Life Cycle of a Data Breach - Cybersecurity Seminar Series
-
Upload
paige-rasid -
Category
Technology
-
view
125 -
download
2
Transcript of Life Cycle of a Data Breach - Cybersecurity Seminar Series
![Page 1: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/1.jpg)
Click to edit Master title style
6/3/2015 1
The Life Cycle of a
Data Breach
Frontier Communications
June 3, 2015Sponsored by:
![Page 2: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/2.jpg)
Top Five Things You Can Do to
Protect Your Clients
and Your Business
UCONN StamfordMarch 30, 2015
Presented by
Bruce CarlsonPresident & CEOConnecticut Technology Council
Introduction
![Page 3: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/3.jpg)
Top Five Things You Can Do to
Protect Your Clients
and Your Business
UCONN StamfordMarch 30, 2015
Presented by
Ken ArndtEast Region PresidentFrontier Communications
Welcome
![Page 4: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/4.jpg)
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Martin McBride
Presented by
Keynote Speaker: CT Attorney General
George Jepsen
To discuss the state’s cybersecurity efforts
![Page 5: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/5.jpg)
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Patricia FisherPresident & CEO, JANUS AssociatesBoard Member, CTCChair, CTC Cybersecurity Task Force
Introduction of Panelists
![Page 6: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/6.jpg)
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Q&A Panel ists
Steven J. BonafonteAttorney, Pullman & Comley; Chair of the firm’s Cybersecurity, Privacy & Infrastructure practice group; member of the firm’s corporate and business department.
Gary CuozzoOwner at ISG Software Group, LLC
Michele LucanAssistant Attorney General, State of CT
Moderator: Patricia FisherPresident & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
![Page 7: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/7.jpg)
© 2015 Pullman & Comley LLC7
Life Cycle Of A Data Breach How To React, Repair, & Resume
Discover Breach
Investigate &
Remediate
Assemble Internal
Response Team
Contact Law Enforcement (If applicable)
Convene Third-Party
Consultants
Begin Notification Process
Consider PR implications
and strategy for response
Mail/Email Notifications
Respond To
Inquiries
Post-Breach Debriefing and Risk
Mitigation
Resume Business
“as usual”
Life Cycle Of A
Data Breach
1
2
3
4
5
67
8
9
10
11
![Page 8: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/8.jpg)
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Q&A Panel ists
Steven J. Bonafonteco-chair of Pullman & Comley’s Cybersecurity, Privacy & Infrastructure practice group and a member of the firm’s corporate and business department.
Gary CuozzoOwner at ISG Software Group, LLC
Michele LucanAssistant Attorney General, State of CT
Moderator: Patricia FisherPresident & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
![Page 9: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/9.jpg)
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Bruce CarlsonPresident & CEOCT Technology Council
Patricia FisherPresident & CEOJANUS Associates, Inc.
Nancy HancockPartnerPullman and Comley LLC
Richard HarrisPartnerDay Pitney LLP
Rick HuebnerPresident & CEOVisual Technologies, Inc.
Lyle LibermanCOOJANUS Associates, Inc.
Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast
Suzanne Novak Owner/PresidentERUdyne. LLC
Dr. Leon PintsovCEO SignitSure Inc.
Paige RasidCOOCT Technology Council
Ray Umerley Vice PresidentChief Data Protection Offi cer, Pitney Bowes
Ron VernierSVP and CIOHartford Steam Boiler
Cybersecur i ty Task Force
![Page 10: Life Cycle of a Data Breach - Cybersecurity Seminar Series](https://reader030.fdocuments.in/reader030/viewer/2022032618/55b7440ebb61ebc4188b45bb/html5/thumbnails/10.jpg)
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Martin McBride
Presented by
When: September 30 | 8:30am – 10:30amWhere: Goodwin College | East HartfordCost: $25 CTC Members | $35 Non-members $40 at the door
Upcoming Seminar
Sponsored by: