Jul. 17, 2019

The Growing Role of the Chief Data Officer: Skill Sets, Priorities and Collaboration

With the proliferation of data into nearly every business decision, the chief data officer (CDO) role is more significant than ever before. However, there is still confusion about what the role truly entails. “The chief data officer’s role is becoming a strategic role that not only assists with innovation but also ensures that the data is handled properly and with the consumer always in mind,” Mastercard CDO JoAnn Stonier told us. This first installment in our series on the role provides an overview of the history and prevalence of the CDO, the common skill sets and priorities of the position, and how the CDO differs from and can collaborate with the CPO. Subsequent coverage will explore common reporting structures for the CDO team, obtaining necessary budgets and the CDO’s role in complying with laws such as the CCPA and in connection with working with third parties. See also “How to Effectively Find, Compensate and Structure Cybersecurity Leadership (Part One of Two)” (Dec. 14, 2016); Part Two (Jan. 11, 2017).

How to Establish an Efficient Incident Response Plan

Incident response plans are a necessary weapon in a company’s arsenal to combat cybercrime. Luke Dembosky, co‑chair of Debevoise & Plimpton’s cybersecurity and data privacy practice and a former cybercrimes prosecutor for the DOJ, spoke with the Cybersecurity Law Report about surmounting the challenges of developing and implementing an effective plan, with a focus on the heavily regulated financial services industry. He addressed, among other things, strategies for ensuring that the plan is properly tailored to the entity, yet dynamic enough to respond to evolving threats. See “Lessons From the Equifax Breach on How to Bolster Incident Response Planning (Part One of Two)” (Sep. 27, 2017); Part Two (Oct. 11, 2017).

Maine Enacts Sweeping Broadband Customer Privacy Law

Continuing the dynamic trend of active state privacy regulation, Maine recently added to the range of laws organizations need to understand and track with a sweeping new law dictating how providers of broadband internet service must handle sensitive customer information. We analyze key provisions of the new law with insights from Martin L. Stern, a partner a Womble Bond Dickinson. See our series on preparing for the California Consumer Protection Act: “Securing Buy-In and Setting the Scope” (Feb. 27, 2019); and “Best Practices and Understanding Enforcement” (Mar. 6, 2019).

Hogan Lovells Expands New York Privacy and Cybersecurity Practice With Former JPMorgan Cybersecurity Head

Peter Marta, former JPMorgan Chase & Co. global head of cybersecurity and global security and investigations legal, has joined Hogan Lovells in New York as a partner in the firm’s privacy and cybersecurity practice. For more from Hogan Lovells, see “Deputy Assistant Attorney General Seeks to Dispel CLOUD Act Misunderstandings One Year In” (May 22, 2019).

Former FBI Supervisory Special Agent Joins Drinker Biddle & Reath as Cybersecurity Counsel in California

Jason G. Weiss, a former FBI Supervisory Special Agent and Digital Laboratory Director, has joined Drinker Biddle & Reath in Los Angeles as counsel in the firm’s information governance and eDiscovery group. For more from Drinker Biddle, see “The Arc of the Deal: Tips for Cybersecurity Due Diligence Advisors in Mergers & Acquisitions From Beginning to End” (Jun. 28, 2017).

Upcoming HFLR/CSLR Webinar to Explore Strategies and Tactics for Conducting an Effective Tabletop Exercise

Please join the Hedge Fund Law Report and the Cybersecurity Law Report on Tuesday, July 30, 2019, at 1:00 p.m. ET for a complimentary webinar discussing the strategies and tactics companies can employ to conduct an effective tabletop exercise. GCs and CCOs are encouraged to invite their CISOs and CTOs to join as well. The webinar will be moderated by Shaw Horton, Associate Editor of the Hedge Fund Law Report, and will feature Luke Dembosky, partner at Debevoise, John “Four” Flynn, chief information security officer at Uber, and Jill Abitbol, Senior Editor of the Cybersecurity Law Report. Registration for the webinar is available here.