Developing Your Information Security Program: WISPs, Policies, and More

Recorded: Thursday, August 11, 2016

Practical Law On-Demand Webinars do not provide CLE.

If you need a Certificate of Completion for another purpose, please send a request to webinars.practicallaw@thomsonreuters.com.


Data breaches and other cyber incidents continue to strike large and small organizations across a variety of industries and sectors. Increasing legal obligations and concerns from customers, business partners, and other stakeholders are driving businesses to proactively assess risks and better protect sensitive data and systems.

Effective information security programs rely on multiple, coordinated program elements. Counsel must understand growing federal and state legal obligations to maintain reasonable data security controls and balance them against customer expectations and business needs.

Please join Practical Law for a free 75-minute webinar in which our expert panelists will offer valuable practice tips and examples for developing your organization’s information security program and preventing cyber incidents.

Attendees of this program will:

  • Learn the difference between a written information security program (WISP) and an information security policy, and why both are crucial for maintaining reasonable data security controls.
  • Consider the legal obligations and issues that affect information security programs and policies.
  • Review important information security program and policy requirements.
  • Explore risk assessment and strategies for preventing cyber incidents.


A short Q&A session will follow.

Speakers:

Melissa Krasnow, Partner, Dorsey & Whitney LLP

Ivan Rothman, Of Counsel, Squire Patton Boggs (US) LLP

Mel Gates, Senior Legal Editor, Practical Law Intellectual Property & Technology, Privacy & Data Security


Practical Law provides practical, up-to-date resources across all major practice areas to help lawyers in law firms and in-house legal departments get up to speed quickly, save time and protect the bottom line.

If you wish to test your computer system prior to the webinar, please click here.
 
Already Registered? Log In Now

Complete this form to enter the webcast.
(* "indicates required field)