Preparing For and Responding To Data Breaches

Cybersecurity

Preparing For and Responding To Data Breaches

This presentation explores Security Incidents, Compromises and Data Breaches from both a technical and legal standpoint. Our data breach presentation delves into the world of compliancy, privacy and the growing number of statutes that organizations need to be aware of and tips for and responding to a privacy breach incident so that when Executive Management and the Legal Team ask the really important questions, the organization is prepared. Learn how to respond to a data breach with our presentation.

Length: 1 hour to 1 ½ hours is ideal.

Benefits of Attending:

  • Understand the complex technical and regulatory environment in which organizations are routinely finding themselves entwined in as it relates to data and data privacy,
  • Learn what things the organization should have in-place prior to a data breach,
  • Walk away with an understanding of a framework and approach for identifying, analyzing and responding to a variety of incidents.

Attendees Will Learn:

  • The Four Most Important questions that Executive Management and the Legal Team will ask,
  • Practical steps that organizations can take prior to an incident to set them up for success.

Presentation By

Damon Hacker, President & CEO | Founder
MBA, CISA, CSXF, CMMC-RP

Damon Hacker is President, CEO and co-owner of Vestige Digital Investigations, a leading technology company specializing in CyberSecurity (proactive & reactive as well as compliance), Digital Forensics and Electronically Stored Information (ESI). He brings more than 30 years of experience in the arena, including a background in IT Security and IT Auditing.

He helps to improve the techniques, processes and technology in cybersecurity. He actively assists clients achieve compliance across multiple cybersecurity frameworks.

Damon is an in-demand speaker on local, state and national levels. He speaks on the subjects of DoD CMMC cybersecurity compliance, IT security, IT auditing, computer fraud, white-collar crime, data breach, non-compete and intellectual property theft.

He earned both his MBA from the Weatherhead School of Management, and his undergraduate degree from Case Western Reserve University, Cleveland, OH. He is a Certified Information Systems Auditor (CISA), CSX Cybersecurity Nexus Fundamentals certification from the Information Systems Audit and Control Association (ISACA), and is Cybersecurity Maturity Model Certification – Registered Practitioner (CMMC-RP) for U.S. Department of Defense contractor cybersecurity compliance.

READ FULL BIO