Understanding and Managing Cyber and Privacy Risk in an Increasingly Risky World

Presented by

Liisa M. Thomas, Managing Partner | Sheppard Mullin

About this talk

Privacy and compliance teams are under increasing pressure to respond quickly to urgent issues. Whether from senior leadership, regulators, consumers, shareholders, or other stakeholders, the pressure after a cyber or other event can be intense. Pressure is equally high to be prepared for potential incidents. What steps can a company take to have a program that is effective and right-sized to its operations? How can it best prepare for the increasing external, unknown, and uncontrollable risks? Drawing from change and risk management research, this session will share some lessons learned and strategies to help you make the most of your privacy compliance program. About the speaker: Liisa Thomas is a partner and lead of the Privacy and Cybersecurity practice at Sheppard Mullin. Her clients rely on her ability to create clarity in a sea of confusing legal requirements and praise her “thoughtful legal analysis combined with real world practical advice.” She is the author of two well-regarded treatises: Thomas on Data Breach and Thomas on Big Data, and teaches privacy and security law classes at Northwestern University where she is the recipient of the Edward Avery Harriman Law School Lectureship. She is consistently recognized as a privacy and cybersecurity leader by Chambers, Cybersecurity Docket, Legal 500, Best Lawyers in America and Crain’s Chicago Business. She was recently named to Legal 500’s Hall of Fame for Cyber Law. Liisa received her J.D. from the University of Chicago.

Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (1813)
Subscribers (185612)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.