The risk that comes with a vendor’s access to sensitive data is a quickly growing concern amongst public and private sector organizations, and when it comes to compliance with new and forthcoming privacy regulations, the weakest link for many is their third-party agreements. On March 10, 2021, the Cybersecurity Law Report and Sentinel LLP co-hosted a webinar to delve into the challenges of a third-party risk management program from the controller’s perspective. The program featured Sentinel co-founder and President Aaron Weller and the Cybersecurity Law Report’s Senior Editor Jill Abitbol. A recording of the webinar can be accessed here.
May 05, 2020
The Senior Editors of the Anti-Corruption Report and the Cybersecurity Law Report teamed up to present an update on the trends and hot topics in the anti-corruption, cybersecurity and data privacy spaces since the beginning of the year and what the publications will be focusing on in the coming months. A complimentary download of the webinar is available here.
The current enterprise shift to remote working has created new cybersecurity and privacy challenges for companies. Our Global Editor-in-Chief, Rebecca Hughes Parker, discussed the increased risks and how to mitigate them with Dr. Christopher Pierson, CEO of BlackCloak, member of DHS’ Data Privacy and Integrity Advisory Committee and former Chief Privacy Officer of Royal Bank of Scotland in a webinar on Monday, March 23, 2020.
Mar 07, 2020
The Cybersecurity Law Report hosted a complimentary webinar that discussed, among other things, which extra-E.U. activities the GDPR captures. It was moderated by CSLR reporter Matthew Fleischer-Black and featured panelists Bridget Treacy, a partner at Hunton Andrews Kurth, and Vivienne Artz, chief privacy officer at Refinitiv.
Jul 30, 2019
The Cybersecurity Law Report and our sister product, the Hedge Fund Law Report, hosted a webinar on Tuesday, July 30, 2019, discussing the strategies and tactics companies can employ to conduct an effective tabletop exercise. The webinar was moderated by Shaw Horton, Associate Editor of the Hedge Fund Law Report, and featureed Luke Dembosky, partner at Debevoise, John “Four” Flynn, chief information security officer at Uber, and Jill Abitbol, Senior Editor of the Cybersecurity Law Report.
Jan 24, 2019
Building a Strong Relationship Between Privacy and Information Security Teams for Effective Data Protection
The Cybersecurity Law Report on January 24, 2019, from 12:00pm-1:00pm EST, hosted a webinar about how privacy and security professionals can effectively coordinate for strong data protection programs. Dan Koslofsky, associate general counsel at Gap Inc., and Aaron Weller, co-founder and strategy VP for Sentinel LLC, joined the Cybersecurity Law Report’s Jill Abitbol to discuss, among other topics, the evolving roles of privacy and security professionals and practical examples of best practices for successful communication and coordination of efforts. Registration information is here.
Dec 06, 2018
With many of the provisions of the New York Department of Financial Services Cybersecurity Regulation now in effect, firms are looking ahead to the March 2019 deadline for meeting the law’s third-party requirements. The Cybersecurity Law Report hosted a complimentary webinar on best practices for compliance with the law. James Shreve, a partner at Thompson Coburn, and Shawn Malone, CEO of Security Diligence, joined the Cybersecurity Law Report’s Rebecca Hughes Parker to discuss, among other topics: regulatory expectations, third-party management challenges, how the regulation’s provisions lay a groundwork for various aspects of a cybersecurity program – such as records management systems and business continuation programs – and strategies for ensuring ongoing compliance.
Jun 04, 2018
Amy Terry Sheehan discussed how to effectively monitor, manage, update and maintain long-term third-party relationships with Kristina Bergman, CEO and founder of Integris Software, Karen Hornbeck, a senior manager at Consilio, and Aaron Tantleff, a partner at Foley & Lardner. They explored from both legal and technical perspectives how to identify potential gaps and overcome challenges with vendors due to changed circumstances, cyber incidents and new requirements and regulations, including the GDPR.
Dec 12, 2017
As demonstrated by recent breaches, the publicity surrounding a cyber incident can cause more damage than just the technical problem itself, raising the stakes on a company’s response. Jill Abitbol delved into cyber crisis communications plans with Siobhan Gorman, director at Brunswick Group, Brian Lapidus, the practice leader of Kroll’s identity theft and breach notification practice, and Seth Harrington, a partner at Ropes & Gray.
Oct 16, 2017
Monitoring data systems and employee digital activity is critical to reducing the significant cybersecurity risks that employees pose, but companies do need to make sure they comply with legal requirements when implementing surveillance programs. Amy Terry Sheehan discussed effective notice, legal considerations, specific policies regarding BYOD, termination and remote employees, how to navigate contrasting rules and approaches in Europe, and more with Mike Pappacena, a managing director at ACA Aponix, Mary Dollarhide, a partner at DLA Piper, and Jennifer Rubin, a member of Mintz Levin.
Sep 18, 2017
Rebecca Hughes Parker discussed balancing convenience with security, innovations in multi-factor authentication, using regulation and guidance, and best practices for implementing and improving online authentication systems with Cassio Goldschmidt, vice president at Stroz Friedberg, Jeremy Grant, managing director at Venable, and Chris Pierson, general counsel and chief security officer at Viewpost.
Nov. 9, 2022
Lessons From the Conviction of Uber’s Former CISO
Nov. 23, 2022
Six Articles to Help Manage Incident Response Efforts
Nov. 16, 2022
What the FAQ: Deciphering the European Commission Guidance on the New SCCs
Nov. 16, 2022
Compliance Checklist for Consumer and Employee DSARs
Oct. 12, 2022
A New Era of Cyber Incident Reporting and Cybersecurity Regulation: Key Provisions