Loading...

Facing Unique Breach Circumstances? Learn What to Do at Experian’s IAPP Seminar

September 29, 2015 by Michael Bruemmer

You need only watch the headlines about data breaches to realize how different each one can be. Some trace their source to a careless or disgruntled insider, some compromise thousands of records of especially vulnerable consumer groups, and others go on for months before they’re detected and stopped. Every breach stems from a unique set of circumstances, but they share commonality in terms of costs, the impact on future business, and the steps companies can take to mitigate their sustained damages.

We’ll be delivering those key messages – and more – during the International Association of Privacy Professionals (IAPP) conference in Las Vegas. A name familiar to regular readers of this blog, our own Senior Director Ozzie Fonseca, CIPP/US, will team with Bill Hardin, Managing Director of Navigant and Lynn Sessions, a partner with Baker & Hostetler, to discuss how companies can manage incidents with unique circumstances. Our session, titled “Not Your Everyday Breach: Managing Incidents with Unique Circumstances,” is slated for September 30 at 11 a.m.

The data breach environment grows more complex every day. Cyber criminals are increasingly more sophisticated and their attacks more inventive. Breach-related class-action lawsuits are on the rise, and notification regulations are increasingly complicated and rigorous. There’s more than ever before to consider when keeping pace with all the changing frontiers of the data breach world.

Developing a data breach response plan is essential for data breach prevention and management, and more companies than ever are implementing such plans. But just having a plan isn’t enough. Responding to an incident is rarely straight-forward, and a company may find itself dealing with unique circumstances that it hasn’t planned for. You shouldn’t assume a one-size-fits-all approach will work for your data breach response plan.

In Las Vegas, our experienced cyber security forensic experts, along with legal and breach resolution authorities, will discuss the challenging and unique situations they’ve seen companies face, and ways you can ensure your company is prepared for unusual situations. They’ll provide insight into the diverse range of complicated and unusual data breach scenarios, share lessons they’ve learned on managing an uncommon breach situation, and discuss how to update your data breach response plan to best account for the many types of breach factors.

Visit https://iapp.org/conference/privacy-security-risk-2015 to learn more.