With constantly evolving cyber threats, a flexible response plan is crucial to direct the quick action that should follow a data security incident. Kim Peretti, co-chair of Alston & Bird’s cybersecurity preparedness and response team, discussed with Cybersecurity Law Report ways to ensure a company is ready to effectively react in real time to whatever attack it is facing. This includes recognizing various plan triggers and clearly outlining responsibilities. See also our three-part guide to developing and implementing a successful cyber incident response plan: “From Data Mapping to Evaluation” (Apr. 27, 2016); “Seven Key Components” (May 11, 2016); and “Does Your Plan Work?” (May 25, 2016).
Feb. 27, 2019
Preparing for the CCPA: Securing Buy-In and Setting the Scope
Mar. 6, 2019
Preparing for the CCPA: Best Practices and Understanding Enforcement
Jul. 18, 2018
What to Expect From California’s Expansive Privacy Legislation
Mar. 13, 2019
Takeaways From 2018 COPPA Developments and a Forward-Thinking Approach to Compliance
Mar. 13, 2019
Essential M&A Cybersecurity Due Diligence Questions
Measuring the effectiveness of a compliance program can be tricky, but some companies are finding ways to use their existing internal controls to generate useful data. Join our sister publication the Anti-Corruption Report (ACR) for a complimentary webinar that explores Hewlett Packard Enterprises’ new travel-and-entertainment-approval tool. On Wednesday, March 27, 2019, from 1:00 p.m. to 2:00 p.m. EDT, the ACR’s Megan Zwiebel will interview Becky Rohr, vice-president of anti-corruption and global trade at Hewlett Packard Enterprises, about how they are using their T&E tool to measure and improve compliance. Registration information is here.