Decoding the Data Breach Framework: How to Prevent Exfiltration
In today’s fast evolving cybersecurity backdrop, maintaining an up-to-date and efficient data breach security has been a tough challenge for companies all over the world. Data attackers are no longer particular with the size of their target and may attack at any moment. Effective detection and prevention of data breach or any form of illegal release of data and information from a company’s system, requires robust security system and close-monitoring from the top level management.
In a two-hour LIVE Webcast, a notable panel of thought leaders and professionals assembled by The Knowledge Group will offer the audience with an in-depth discussion of the fundamental aspects of a data breach. The panel will also provide the audience with the best practices to avoid common risk and pitfalls in a data breach.
Key topics include:
- The Anatomy of a Breach
- Risks and Legal Challenges in Data Breach
- Data Exfiltration Methods
- Identifying, Detecting and Preventing Data Breach
- Recent Trends and Developments
K. Jon Breyer, Partner
Lindquist & Vennum LLP
The Anatomy of a Breach
- While the continuing occurrence of data breaches is well documented, what is far less understood is why data breaches happen and what can be done to prevent them. This presentation attempts to arm lawyers with the basic tenants of a data breach and introduce them to the methods used by cybercriminals.
- The presentation examines and illustrates the four phases of targeted attacks: incursion, discovery, capture, and exfiltration.
- Once attackers acquire the stolen information, the impact to any organization or institution may include sabotage, data theft, and damage to brand image and reputation. We will discuss and dissect some of the most newsworthy attacks and examine how the breaches occurred and what lessons we have learned that can prevent them from reoccurring.
Data Exfiltration Methods
- From the hacking of celebrities’ phones to massive cyber-attacks on major retailers, it’s clear that cybercrime is on the rise and here to stay. The nature of these crimes adapts in response to improving cybersecurity tactics, and the sheer variety and hybrid nature of virtual thefts, denials of service, and other methods is unprecedented.
- Advanced Persistent Threats (APTs) are one form of cyber attack in which data exfiltration is often a primary goal. APTs refer to a category of high-risk threats that pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen target institutions or enterprises. We will discuss the most common APTs and illustrate the ways in which cybercriminals gain access to the network, find and then expose sensitive information.
- The presentation will also address the types of cybercrimes that are mostly likely to be on the rise in 2016 and provide ways to detect and avoid them.
Lucy T. Unger, Partner
Williams Venker & Sanders LLC
- Recent developments in standing to sue merchants for breach of customer account data;
- Emerging roadmaps/best practices to prevent, detect, and report breaches to customer account data; and
- Legal and ethical obligations of lawyers and law firms to prevent breaches to their client data and best practices to employ.
Who Should Attend:
- Privacy Law Attorneys
- Privacy and Data Security Professionals
- Information Management Officers
- Risk and Compliance Officers
- Top Level Management
- Private and Public Companies
- Multinational Companies
- Other related/interested Professionals and Organizations
As a seasoned trial lawyer and MSBA Certified Civil Trial Law Specialist, Jon Breyer represents companies in complex transaction-related disputes arising from all varieties of business agreements. Jon is also head of Lindquist & Vennum’s Privacy and Data Security Litigation practice group and counsels clients on data security and privacy laws, including representing businesses and individuals who have fallen victim to data security breaches and those targeted by litigation and government investigations stemming from several highly publicized data security cases.
As a seasoned trial lawyer and MSBA Certified Civil Trial Law Specialist, Jon Breyer represents companies in complex transaction-related disputes …
Lucy Unger is a partner in the St. Louis-based boutique law firm of Williams Venker & Sanders. Last year she was named one of Missouri’s three top Woman Litigators by her peers. She spends 100% of her time representing clients in the healthcare, manufacturing, financial, government, and insurance industries with a variety of litigation matters. She tends to represent her clients after they have been sued and are defending claims made against them, but she also takes cases on behalf of corporate plaintiffs for commercial claims. For the past 20 years, she has regularly appeared before State and Federal Courts at both the trial court and appellate court level throughout Missouri and Illinois.
Lucy Unger is a partner in the St. Louis-based boutique law firm of Williams Venker & Sanders. Last year she …
Print and review course materials
Method of Presentation:
NASBA Field of Study:
Specialized Knowledge and Applications
NY Category of CLE Credit:
Unlock All The Knowledge and Credit You Need
Leading Provider of Online Continuing Education
It's As Easy as 1, 2, 3
Get Your 1-Year All Access Pass For Only $199
About Lindquist & Vennum LLP
Lindquist & Vennum’s 170 attorneys in Minnesota, Colorado, and South Dakota provide a full array of corporate finance, transactional, and litigation services. The firm has established and emerging practices in many industry and specialty areas, including private equity, data security, financial institutions, real estate, healthcare and life sciences, renewable energy, and bankruptcy. For nearly five decades, the firm has served corporate, governmental, and individual clients across the nation and around the world. For more information, visit www.lindquist.com.
About Williams Venker & Sanders LLC
Williams Venker & Sanders, LLC (“WVS”) is a boutique trial firm in St. Louis, Missouri that specializes in complex litigation. WVS prides itself on preparing matters to the client’s best advantage so that the client can have the latitude to decide whether to take the case to trial or dispose of it some other way. Its lawyers offer clients the expertise, skill and wisdom sometimes associated with only larger law firms, but with the immediate availability and cost-effectiveness of a small firm, striving to provide each client with a focused, comprehensive strategy that provides an early, clear analysis of options so that the client can make informed decisions as quickly as possible.