vc_enabled:-----2014 Webinars

Breaking Murphy’s Law in a Network Security Breach

Download PDF: Webinar Slides

Download PDF: Network Security Breach Slides

Advisen hosted a webinar that analyzed what happens when there is a breach and how companies can maintain control of the recovery process.

On June 3, Lewis Brisbois Bisgaard & Smith’s John Mullen, NetDiligence’s Mark Greisiger, AllClear ID’s Bo Holland, Allied World’s Joshua Ladeau, and Advisen’s David Bradford offered insights on how companies can effectively prepare against a network security breach. This free, one-hour webinar is sponsored by Allied World.

Panelists

The following panelists participated in the webinar:

  • John Mullen, Partner, Lewis Brisbois Bisgaard & Smith LLP
  • Mark Greisiger, President, NetDiligence®
  • Bo Holland, Founder & CEO, AllClear ID
  • Joshua Ladeau, Allied World US Technology Practice Lead (co-moderator)
  • David Bradford, President, Research & Editorial division, Advisen (co-moderator)

Webinar Topics

Topics discussed:

  • What are some of the common mistakes in managing a breach?
  • What are the potential consequences of a poorly-managed breach response?
  • What should companies be doing in advance of a cyber incident to prepare?
  • How can organizations know the types of services they may require to respond to a breach, and how do they identify the best vendors for their needs?
  • If a company suspects their network has been breached, who do they call first?
  • If the company has an insurance policy providing breach response services, how should the risk manager assure that the company gets full benefit of the services and protections purchased?
  • What typically happens during the first 48 hours following the discovery of a breach? The first week? The first month?
  • When should the breach be disclosed? What are the potential consequences of revealing a breach too quickly, or of delaying notification?
  • If the breach involves payment card information, are there additional incident handling requirements?
  • When should law enforcement agencies get involved?
  • How has insurance coverage evolved to respond to the needs of organizations experiencing a breach?