Sessions
This session will define HR best practices for protecting your employer from cyber-intrusion, data breach and the theft of intellectual property. It will provide you with reaction timelines and practices and will outline factors to consider when retaining outside investigative experts, identity-theft protection services and other vendors in order to respond promptly and effectively to breach incidents and events. Cyberattacks of all sorts are rampant, and personnel is your first line of defense and response. You will learn:
- Policy, personnel and training vulnerabilities.
- How to establish a response program on which you can rely when responding to a data security incident of any magnitude.
- How to identify resources for investigating an incident, so that you can provide required after-breach protections (such as identity-theft protection, response call centers and notifications).