In this report, we’ll feature segments from a live presentation by cybersecurity expert, John Reed Stark. Stark, will examine and analyze the workflows that are typical after a data breach. The presentation was recorded at a recent Financial Executives International conference. FEI, is an organization that has been connecting senior-level financial executives by serving the needs and interests of its members for over 80 years. Mr. Stark is President of John Reed Stark LLC and the former Chief of the SEC’s Office of Internet Enforcement. He speaks first-hand as a seasoned data-breach expert, not only on how to handle the inevitable data breach, but what preemptive steps to take now to insure adequate preparation.
After successfully completing this segment, you should be able to:
- Discuss the importance of preserving data after a breach;
- Understand why malware is so often misunderstood;
- Understand why remediation needs to begin immediately after a breach:
- Recognize that state and federal regulatory compliance is often fragmented and aggressive.