Life Cycle of a Data Breach - Cybersecurity Seminar Series

Preview:

Citation preview

Click to edit Master title style

6/3/2015 1

The Life Cycle of a

Data Breach

Frontier Communications

June 3, 2015Sponsored by:

Top Five Things You Can Do to

Protect Your Clients

and Your Business

UCONN StamfordMarch 30, 2015

Presented by

Bruce CarlsonPresident & CEOConnecticut Technology Council

Introduction

Top Five Things You Can Do to

Protect Your Clients

and Your Business

UCONN StamfordMarch 30, 2015

Presented by

Ken ArndtEast Region PresidentFrontier Communications

Welcome

Life Cycle

of a Data

Breach

UCONN StamfordMarch 30, 2015

Sponsored by:

Martin McBride

Presented by

Keynote Speaker: CT Attorney General

George Jepsen

To discuss the state’s cybersecurity efforts

Life Cycle

of a Data

Breach

UCONN StamfordMarch 30, 2015

Sponsored by:

Presented by

Patricia FisherPresident & CEO, JANUS AssociatesBoard Member, CTCChair, CTC Cybersecurity Task Force

Introduction of Panelists

Life Cycle

of a Data

Breach

UCONN StamfordMarch 30, 2015

Sponsored by:

Presented by

Q&A Panel ists

Steven J. BonafonteAttorney, Pullman & Comley; Chair of the firm’s Cybersecurity, Privacy & Infrastructure practice group; member of the firm’s corporate and business department.

Gary CuozzoOwner at ISG Software Group, LLC

Michele LucanAssistant Attorney General, State of CT

Moderator: Patricia FisherPresident & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force

© 2015 Pullman & Comley LLC7

Life Cycle Of A Data Breach How To React, Repair, & Resume

Discover Breach

Investigate &

Remediate

Assemble Internal

Response Team

Contact Law Enforcement (If applicable)

Convene Third-Party

Consultants

Begin Notification Process

Consider PR implications

and strategy for response

Mail/Email Notifications

Respond To

Inquiries

Post-Breach Debriefing and Risk

Mitigation

Resume Business

“as usual”

Life Cycle Of A

Data Breach

1

2

3

4

5

67

8

9

10

11

Life Cycle

of a Data

Breach

UCONN StamfordMarch 30, 2015

Sponsored by:

Presented by

Q&A Panel ists

Steven J. Bonafonteco-chair of Pullman & Comley’s Cybersecurity, Privacy & Infrastructure practice group and a member of the firm’s corporate and business department.

Gary CuozzoOwner at ISG Software Group, LLC

Michele LucanAssistant Attorney General, State of CT

Moderator: Patricia FisherPresident & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force

Life Cycle

of a Data

Breach

UCONN StamfordMarch 30, 2015

Sponsored by:

Presented by

Bruce CarlsonPresident & CEOCT Technology Council

Patricia FisherPresident & CEOJANUS Associates, Inc.

Nancy HancockPartnerPullman and Comley LLC

Richard HarrisPartnerDay Pitney LLP

Rick HuebnerPresident & CEOVisual Technologies, Inc.

Lyle LibermanCOOJANUS Associates, Inc.

Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast

Suzanne Novak Owner/PresidentERUdyne. LLC

Dr. Leon PintsovCEO SignitSure Inc.

Paige RasidCOOCT Technology Council

Ray Umerley Vice PresidentChief Data Protection Offi cer, Pitney Bowes

Ron VernierSVP and CIOHartford Steam Boiler

Cybersecur i ty Task Force

Life Cycle

of a Data

Breach

UCONN StamfordMarch 30, 2015

Sponsored by:

Martin McBride

Presented by

When: September 30 | 8:30am – 10:30amWhere: Goodwin College | East HartfordCost: $25 CTC Members | $35 Non-members $40 at the door

Upcoming Seminar

Sponsored by:

Recommended