Data Breach Incident Response Process: Risks, maintaining privilege, and engaging service providers

Logan Parker
Logan Parker
Bryan Cave Leighton Paisner

Logan Parker serves as a privacy advisor to business clients across a variety of industries and provides strategic and legal guidance on data privacy issues.

Robert S. Jett III
Robert S. Jett III
Crawford & Company

“Bob” serves as Chief Privacy Officer and lead IT counsel for Crawford & Company. He has experience as a legal advisor and in-house counsel with multi-national organizations.

On-Demand: May 4, 2022

Accrediation Provided by:
myLawCLE
MCLE Credit Information:

Select Your State Below to View CLE Credit Information

Unable to Attend Live Broadcast?

Receive access to recorded class and earn self-study credit. Recording is made available 5 business days after live broadcast.

Can't Decide Which CLE Progam?

Access All
Federal Bar CLE Programs
co-sponsored with myLawCLE
Only $245yr

Annual Subscription includes access to:
  • 500+ Live CLE Webinars
  • National Hot Legal Topics
  • New Laws and Regulations
  • State Specific Programs
  • All Formats: Live, Replay, & On-Demand
Subscribe Today
Training 5 or more people?

Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs

Program Summary

During this session, participants can expect to learn more about the incident response process, why it is important for practitioners to be aware of the risks associated with an incident, and why they should be proactive in preparing for an inevitable data security incident. This session will also focus on privilege issues stemming from data security incidents and how to properly engage service providers to assist in incident response, while maintaining privilege. Finally, this session will wrap up by walking participants through a case study/mini-table top exercise that illustrate some of the issues highlighted in the previous sections.

This course is co-sponsored with myLawCLE.

Key topics to be discussed:

  • What is Incident Response and Why It’s Important?
  • Best Practices of Maintaining Privilege
  • Best Practices of Engaging Service Providers
  • Case Study and Mini Table-Top

Date / Time: May 4, 2022

  • 3:00 pm – 5:10 pm Eastern
  • 2:00 pm – 4:10 pm Central
  • 1:00 pm – 3:10 pm Mountain
  • 12:00 pm – 2:10 pm Pacific

Choose a format:

Live Video Broadcast/Re-Broadcast: Watch Program "live" in real-time, must sign-in and watch program on date and time set above. May ask questions during presentation via chat box. Qualifies for "live" CLE credit.

On-Demand Video: Access CLE 24/7 via on-demand library and watch program anytime. Qualifies for self-study CLE credit. On-demand versions are made available 5 business days after the original recording date and are viewable for up to one year.

Closed-captioning available

Speakers

Logan Parker_Bryan Cave Leighton Paisner_myLawCLELogan Parker | Bryan Cave Leighton Paisner

Logan Parker serves as a privacy advisor to business clients across a variety of industries and provides strategic and legal guidance on data privacy issues. He regularly counsels his clients on legal matters that include privacy, cybersecurity, technology, IT contracts, the internet, big data, and cross-border data transfers. He also serves as breach counsel for a wide variety of data security incidents and breaches, domestic and abroad, including business email compromises, ransomware attacks, wire frauds, and unauthorized and inadvertent disclosures.

Logan is a Certified Information Privacy Professional/United States by the International Association of Privacy Professionals and is certified in Healthcare Compliance by the Health Care Compliance Association and has a Yellow Belt with Legal Lean Sigma.

 

Robert S. Jett III_Crawford & Company_myLawCLERobert S. Jett III | Crawford & Company

“Bob” serves as Chief Privacy Officer and lead IT counsel for Crawford & Company. He has experience as a legal advisor and in-house counsel with multi-national organizations in the medical device, insurance and financial services industry and has worked closely with colleagues and issues related to Information Technology, Data Privacy and Protection, Information Security and Corporate Compliance functions. This has included the creation, implementation and maintenance of global compliance, incident response and data privacy programs and managing a global privacy office for several global companies.

Agenda

I. What is Incident Response and Why It’s Important? | 3:00 pm – 3:30 pm
II. Best Practices of Maintaining Privilege | 3:30 pm – 4:00 pm

Break | 4:00 pm – 4:10 pm

III. Best Practices of Engaging Service Providers | 4:10 pm – 4:40 pm
IV. Case Study and Mini Table-Top | 4:40 pm – 5:10 pm