[Webinar] Information Governance and Cyber Security Breach Review: Best Practices

August 10th, 1:00 pm - 2:00 pm EDT
Association of Certified E-Discovery Specialists (ACEDS)
Contact
August 10th, 2022
1:00 PM - 2:00 PM EDT

The best practice approach to effectively handling a data security incident starts with a proactive response plan. But when the inevitable occurs, will your plan stand up to the test? Join our panel of experts as they discuss the nuances of standing up an effective response plan including understanding the role of information governance, partnering with the right players, and having a sound notification and credit monitoring solution.

On this webinar we will explore:

  1. Security Incidents vs. Data Breach
    • What the difference is and why it matters
  2. Information Governance and Cyber Security
    • Understanding the relationship between the two
  3. Post Breach Response & Review
    • The essential ingredients in responding to an incident
  4. Notification and Credit Monitoring
    • Why this is so crucial

Speakers

James A. Sherer

James A. Sherer
Partner
BakerHostetler

James A. Sherer is a Partner in the New York office of BakerHostetler, where he co-leads the Emerging Technology Team for the Digital Assets and Data Management Group while directing Information Governance, Data Privacy, and Artificial Intelligence engagements. James holds an MBA, the CIPP/US, CIPP/E, CIPM, FIP, and PLS data privacy professional credentials, the CIP and IGP information governance designations, the UCLA Extension Global Cyber Institute’s Cybersecurity Certification, and the CEDS and eDPC eDiscovery specialist credentials. James is U.S. and Global Chambers® Ranked for eDiscovery, a Life Fellow of the American Bar Foundation, and serves as a member of The Sedona Conference® Working Groups One, Six, and Eleven and the IEEE Organizational Governance of AI Working Group.

Reed Stanton, CIPP/US

Reed Stanton, CIPP/US
Breach Response Team Lead
First Watch Technologies, Inc

Stanton has been with First Watch Technologies (and its predecessor) since age 16. Starting as a customer service representative answering and handling data breach calls, Stanton quickly assumed increasing responsibilities including writing FAQs, training staff, and developing procedures for the customer service department.

After studying Economics at Clemson University, Stanton returned to First Watch and is now Team Lead on the Breach Response Team as well as Cyber Product Coordinator for the Small Business Department.

Eder Ribeiro J.D., M.S.

Eder Ribeiro J.D., M.S.
Sr. Cybersecurity Program Manager
TransUnion

Eder is a founding member and leader of Cyberscout’s (A TransUnion Company) Incident Response Forensics (IRF) team. Eder leads the IRF team which is part of the organization’s overall Global Incident Response team, focusing on Digital Forensics Incident Response services to the insurance market and law firms. Eder and his team support IRF operations in the US, Canada, Australia, some European and LATAM jurisdictions. Eder has a background in cybersecurity, privacy, incident response and leadership. Prior to joining TransUnion, Eder earned a Juris Doctor with a focus on privacy, compliance, contracts, and corporate law from Roger Williams University School of Law. Eder also earned a Master’s of Science degree in Cybersecurity from Roger Williams University. Eder has and continues to serve as a Non-Commissioned Officer in the Rhode Island Army National Guard for sixteen (16) years, including a tour of duty in the Kandahar province, Afghanistan, in support of Operation enduring Freedom.

Stephen Kennedy, Esq.

Stephen Kennedy, Esq.
Director, Managed Review and Cyber Incident Response Services
Conduent

Stephen Kennedy is an experienced leader and technologist with over 10 years of experience working in the ediscovery technology space. He is passionate about the application of technology to client challenges to ensure the smooth delivery of legal services in processes that are scalable and repeatable. Steve is a specialist in data culling and has worked with clients, both large and small, to achieve data culling that resulted in millions of dollars in savings to clients. Steve has extensive experience using multiple review tools and analytical options. Using a multi-faceted approach, he believes there is no one single way to get to the best result but instead that a holistic approach involving analytics and more traditional culling methods is required and that working with data sets at the early onset of cases allows for the best results. Steve also works with cyber incident response clients to effectively manage the challenges on incident response including data identification and privacy review.

Steve began his career in ediscovery working on one of the largest environmental disaster cases in the United States and went from being an initial reviewer on the matter to running the groups Chicago office and a team of over 100 attorneys. From there he moved to Inventus, working as a project manager on the left side of the EDRM model. In 2018, Steve was asked to launch Inventus’ domestic review business and successfully launched and ran this business line until Legility purchased Inventus in 2019. As part of that launch he was involved in all aspects of the business including HR, hiring, review processes and procedures, physical space build out, handbook creation, and technology choices. Steve started with Conduent in September 2022.

PRESENTED BY:

Association of Certified E-Discovery Specialists (ACEDS)
Contact
more
less

Association of Certified E-Discovery Specialists (ACEDS) on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.