What IT and Legal Must Know to Secure Sensitive Data

7

Click here to load reader

description

The thought of sensitive data falling into the hands of an adversary keeps corporate counsel up at nights. Whether through porous e-discovery practices or boilerplate security protocols, organizations of all types risk costly breaches. This session teaches how to: • Foster a culture that values data security, • Vet and manage service providers, • Treat confidential data, • Tighten data access controls and e-discovery protocols, and • Secure personal computing devices, like smart phones. In this panel, experts at top companies and law firms tell you where the greatest risks lurk and how to confront them.

Transcript of What IT and Legal Must Know to Secure Sensitive Data

Page 1: What IT and Legal Must Know to Secure Sensitive Data

What IT and Legal Must Know to Secure Sensitive Data

Thursday, Oct. 10 | 11:30 – 12:30

Page 2: What IT and Legal Must Know to Secure Sensitive Data

Robert Brownstone

E-Discovery Counsel & Co-Chair, Electronic Information Management

| Fenwick & West

Page 3: What IT and Legal Must Know to Secure Sensitive Data

Justin Dolly

Chief Information Security Officer & Vice President | ServiceNow

Page 4: What IT and Legal Must Know to Secure Sensitive Data

Patrick Heim

Chief Trust Officer | Salesforce

Page 5: What IT and Legal Must Know to Secure Sensitive Data

Your Notes

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 6: What IT and Legal Must Know to Secure Sensitive Data

Your Notes

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Page 7: What IT and Legal Must Know to Secure Sensitive Data

Your Notes

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________