life cycle of a data breach - cybersecurity seminar series
TRANSCRIPT
Click to edit Master title style
6/3/2015 1
The Life Cycle of a
Data Breach
Frontier Communications
June 3, 2015Sponsored by:
Top Five Things You Can Do to
Protect Your Clients
and Your Business
UCONN StamfordMarch 30, 2015
Presented by
Bruce CarlsonPresident & CEOConnecticut Technology Council
Introduction
Top Five Things You Can Do to
Protect Your Clients
and Your Business
UCONN StamfordMarch 30, 2015
Presented by
Ken ArndtEast Region PresidentFrontier Communications
Welcome
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Martin McBride
Presented by
Keynote Speaker: CT Attorney General
George Jepsen
To discuss the state’s cybersecurity efforts
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Patricia FisherPresident & CEO, JANUS AssociatesBoard Member, CTCChair, CTC Cybersecurity Task Force
Introduction of Panelists
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Q&A Panel ists
Steven J. BonafonteAttorney, Pullman & Comley; Chair of the firm’s Cybersecurity, Privacy & Infrastructure practice group; member of the firm’s corporate and business department.
Gary CuozzoOwner at ISG Software Group, LLC
Michele LucanAssistant Attorney General, State of CT
Moderator: Patricia FisherPresident & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
© 2015 Pullman & Comley LLC7
Life Cycle Of A Data Breach How To React, Repair, & Resume
Discover Breach
Investigate &
Remediate
Assemble Internal
Response Team
Contact Law Enforcement (If applicable)
Convene Third-Party
Consultants
Begin Notification Process
Consider PR implications
and strategy for response
Mail/Email Notifications
Respond To
Inquiries
Post-Breach Debriefing and Risk
Mitigation
Resume Business
“as usual”
Life Cycle Of A
Data Breach
1
2
3
4
5
67
8
9
10
11
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Q&A Panel ists
Steven J. Bonafonteco-chair of Pullman & Comley’s Cybersecurity, Privacy & Infrastructure practice group and a member of the firm’s corporate and business department.
Gary CuozzoOwner at ISG Software Group, LLC
Michele LucanAssistant Attorney General, State of CT
Moderator: Patricia FisherPresident & CEO, JANUS ASSOCIATES; Board Member, CTC; Chair, CTC Cybersecurity Task Force
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Presented by
Bruce CarlsonPresident & CEOCT Technology Council
Patricia FisherPresident & CEOJANUS Associates, Inc.
Nancy HancockPartnerPullman and Comley LLC
Richard HarrisPartnerDay Pitney LLP
Rick HuebnerPresident & CEOVisual Technologies, Inc.
Lyle LibermanCOOJANUS Associates, Inc.
Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast
Suzanne Novak Owner/PresidentERUdyne. LLC
Dr. Leon PintsovCEO SignitSure Inc.
Paige RasidCOOCT Technology Council
Ray Umerley Vice PresidentChief Data Protection Offi cer, Pitney Bowes
Ron VernierSVP and CIOHartford Steam Boiler
Cybersecur i ty Task Force
Life Cycle
of a Data
Breach
UCONN StamfordMarch 30, 2015
Sponsored by:
Martin McBride
Presented by
When: September 30 | 8:30am – 10:30amWhere: Goodwin College | East HartfordCost: $25 CTC Members | $35 Non-members $40 at the door
Upcoming Seminar
Sponsored by: