Posted on
in Presentations
Seventeen years later: do you have everything in place to respond to a data breach? This session will bring together a lawyer, cybersecurity expert and identity monitoring expert to show what you must do prior to a breach and to refresh your current preparedness. It will show you what third parties you need to engage so your business does not suffer from a fumbled attempt to retain customers.
Protecting Data & the Supply Chain Ecosystem Identity Analytics Intelligence & Response
risk management incident response identity theft governance risk & compliance data security
Topic
Protecting Data & the Supply Chain Ecosystem
Identity
Analytics Intelligence & Response
Subtopic
risk management
incident response
identity theft
governance risk & compliance
data security
Share With Your Community