In this expert presentation, cybersecurity incident response, legal discovery, and privacy experts will share how organizations should be prepared to respond to a cyber-related incident, while also gaining insight into cutting-edge data discovery technologies and proven document review services to support the detection, identification, review, and notification processes required by law after sensitive data-related breaches and disclosure.
Webcast Highlights:
+ Incident Response: Overview of Services and When to Engage to Use Them
+ Identifying Sensitive Data Post Breach via Impact Assessment: Establishing Scope and Reducing Risk
+ Post Breach Discovery: HaystackID ReviewRight Protect™ Document Review Services and Technology Enablers to Support Isolation, Collation and Organization of PII/PHII Relating to Breached Entities
+ Notification and Disclosure Reporting: Obligations, Best Practices, and Methods for Streamlining Entity Notification and Disclosure
Presenting Experts:
+ Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA - Michael is the Chief Innovation Officer and President of Global Investigation Services for HaystackID
+ John Wilson, ACE, AME, CBE - As CISO and President of Forensics at HaystackID, John is a certified forensic examiner, licensed private investigator, and IT veteran with more than two decades of experience.
+ Jenny Hamilton, JD - As the Deputy General Counsel for Global Discovery and Privacy at HaystackID, Jenny is the former head of John Deere's Global Evidence Team.
+ John Brewer - As Lead Data Scientist, John serves as the Head of Advanced Technology Services for HaystackID.