Security Management: Preparing for a Data Breach

A Toolkit Review for CIOs and CISOs

Topics: Information Technology, Data Management, IT Governance, Information Security

This is a preview of restricted content.

  • If you are an EAB member, please log in.
  • If you are logged in and still see this message, the content is outside your membership portfolio, and we invite you to learn more by contacting us.
  • If you are not an EAB member and wish to learn more, please contact us.

About the Webconference

Whether by accidental loss of a protected device, petty theft, major criminal activity, or international espionage, breaches in data security are not a question of if, but of when. CIOs and CISOs can use our IT Breach Preparation and Response Toolkit to reduce the likelihood, duration, and cost of data breaches.

This webconference will review our toolkit to help members lay the groundwork for effective breach response. A visiting CIO will be on hand to further explain the rationale behind the advice and templates.

This session will explore how to:

  • Expedite breach response
  • Reduce cost of both breach and response
  • Minimize risk to the institution if a breach occurs
  • Protect the reputation of the institution

Presenter: Laura Whitaker and Ernie Hood