India's newly proposed data protection framework, prepared by the expert committee chaired by Justice B. N. Srikrishna, and its upcoming mandatory breach notification requirements, raise some compelling questions.
This panel shares its insights on:
What would constitute a personal data breach under the new...
Cyber threats pervade almost every aspect of our lives today creating risks that have huge potential impacts on legal and compliance matters. Should we be more concerned? Should we be more aggressive in our pursuit of solutions? Join Dr. Ed Amoroso, former CISO of AT&T and current CEO of TAG Cyber, as he walks us...
As cyber threats grow and regulatory regimes strengthen, global enterprises increasingly are in search of a common cybersecurity framework to improve their abilities to be both secure and compliant. At the heart of this discussion is the NIST Cybersecurity Framework, which has emerged as a de facto global standard....
Creating a cybersecurity incident response plan is a fundamental requirement of any cybersecurity program - and a requirement of many global regulations, including GDPR and PCI DSS. During this workshop, Troutman Sanders partner Ron Raether will discuss the benefits of table top exercises. He then will explain how to...
Smart cities contain IT, OT and IIOT environments at different scales, which are dependent on each other at variant degrees, but not managed centrally. The Global Cyber Alliance will explore the systemic risk and legal/compliance challenges that come with securing smart city initiatives and how they can be addressed....
Since 2011, the US federal government has required agencies to establish insider threat detection and prevention programs. What are the elements of a successful insider threat program, and how can these help non-government entities improve their own defenses and regulatory compliance? The CERT Insider Threat Center at...
British Airways, Panera Bread and Facebook/Cambridge Analytica have been among the year's highest-profile breaches. But beyond the headlines and reputational damage, what are the legal realities of a major data breach? And what are key elements of a breach investigation that you must know before, during and after...
As of March 1, 2019, the two-year transition comes to an end, and covered entities are required to be in compliance with the New York Department of Financial Services Cybersecurity Regulation Section 500.11, the Third Party Service Provider Security Policy. What are the key requirements of this section, and how might...
In October of 2018, the banking industry unveiled its new Cybersecurity Profile to help financial institutions develop and maintain cyber risk management programs. This groundbreaking document - the culmination of two years' work - marries the NIST Cybersecurity Framework with the finance sector's highly complex...
Digital commerce is now the business of big data science. To combat cyber threats like the exposure of Personally Identifiable Information (PII), solutions need to keep pace with fraudsters through prevention and quick response when attacks happen.
The application of artificial intelligence and machine learning...
An inside view of what HHS OCR is seeing on the healthcare sector privacy and security landscape, and what the agency has in the works to address those challenges. That includes:
Insights from OCR's latest breach and compliance investigations of covered entities and BAs.
An update on OCR's HIPAA enforcement...
Following the HHS OCR presentation, a panel of CISOs and regulatory and legal experts will dig into how major health data breach trends are changing, and why. For instance:
What lessons can be learned from some of the latest breach trends, including the steady surge in reported hacker incidents
Cybercriminals,...
Some of the biggest health data breaches - including headliner Wall of Shame breaches in 2018 - are due to insiders who click on phishing emails, and fall for business email compromise scams. While there is also plenty of record snooping by insiders, healthcare also has its share of malicious bad actors looking to...
What's the state of healthcare information security, and how are the healthcare sector and government agencies working to address the increasingly complex cyber challenges? Our presenter provides insights into the latest efforts and hot topics, including:
How the sector can implement key cyber recommendations from a...
A panel of experts join keynoter Greg Garcia to dig into some of the most critical recommendations by the Department of Health and Human Services' cyber task force for improving the state of cybersecurity in the healthcare sector. The panel will discuss:
The current state of one or more of the key imperatives, such...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.