As part of our continuing Webinar Learning Series in Privacy and Data Security, Manatt invites you to join a seasoned privacy professional and the co-chair of Manatt’s Privacy and Data Security practice for “Credit Card Breaches and PCI: Strategies for Data Breach Avoidance, Response, and Forensic Investigation.” Our panel will focus on the data security best practices that in-house counsel at corporations of all sizes and across all industries need to know.
Every organization is subject to the threat of a data breach, misuse of internal or customer information, data loss, and infractions of privacy protocols. Our speakers will outline the tactics and best practices for conducting an internal investigation in response to a data breach. The sequencing of measures to be taken has the utmost importance in the outcome and success of the investigation and will enable the corporate law department to identify what data notification laws must be applied, and how PCI standards are serving as a benchmark for other industries outside retail and finance.
- Tactics and strategies to institute enforceable protocols within your organization.
- What the current litigation landscape looks like.
- How your peers are tackling these complex issues.
- Practical solutions to the ongoing cyberthreats from internal and external sources.
Donna Wilson, partner and co-chair of the firm’s Privacy & Data Security practice, has been advising in-house counsel for nearly a decade on mitigating the risks and defending litigation arising out of data breach and privacy infringement.
Ingrid Beierly is the president of Bollozos Payment Security Consulting, a payment consulting firm advising financial institutions. Previously, she was a senior business leader at Visa Inc., where she was responsible for managing global forensic investigations on external data compromises for payment system risk, had insights into data security breaches and malicious software impacting merchants, payment processors, and third-party agents, and provided technical support in mitigating risk to the impacted entity
To view a recording of this webinar, click here.