Data Security - Seven Crucial Steps to Achieving Legislative Compliance

Instructor: Nell Walton
Product ID: 700075
Training Level: Basic
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-963-2556


Read Frequently Asked Questions

This Data Security training will also give a detailed analysis of what went wrong at Card systems Solutions, which was the most publicized data breach of 2005.


This session will give a history of the first data breach legislation passed in the US (California SB 1386 - it was because of SB 1386 that data breach knowledge became public for the first time).

Last year became infamous for its endless round of data security breaches. By the end of 2005, the number of breaches were staggering. Companies had reported breaches due to hacking, stolen laptops, stolen computers, hacked passwords, social engineering, lost backup tapes as well as employee theft. According to the Privacy Rights Clearinghouse, by December 2005, more than 50 million personal information records had been reported as compromised. (In an ironic twist, even FTC Chief Deborah Platt Majoras received notification that her personal information had been stolen in a breach at shoe retailing giant, DSW.)

We will also give an update and analysis on the 23 state data breach notification laws that have been passed in the last year and give details on what’s happening at the federal level in regards to a nationwide federal data breach notification.

The webinar will provide a seven-step program that a company can use to aid with compliance with these various data privacy laws:

  1. Senior management commitment
  2. User buy-in - from the grassroots up
  3. How to do a reliable risk analysis and apply appropriate remediation (to include information that is covered by the new laws)
  4. Documentation
  5. Staff Training
  6. How to implement a CSIRT (Computer Security Incident Response Team) specifically for data security incidents
  7. Setting up a hotline and/or mechanism for reporting noncompliance and security issues.

This session will also give a detailed analysis of what went wrong at Cardsystems Solutions, which was the most publicized data breach of 2005.

What Will Attendees Learn?

  • California SB 1386 and other legislation
  • Seven Steps to Data Security Compliance
  • Choicepoint Inc. - What went wrong and why they are paying $15 million to the FTC

Who Will Benefit:

Audience designations who might be interested

  • Senior Management
  • CSO
  • Internal and External Auditors
  • Information Security Managers
  • Information Security Staff

Instructor Profile:

Nell Walton, has spent nearly 20 years as a database administrator, business and system analyst. She has worked in a wide range of sectors including the manufacturing, legislative, legal, financial and telecommunications industries. As a CISSP and CISA certified professional she has extensive experience in both security and compliance issues, especially for companies, which must comply with Sarbanes-Oxley, HIPAA, Gramm-Leach-Blilely, ISO 17799, VISA PCI standards and current privacy legislation. Her experience covers everything from network security to software development lifecycle control evaluation to in-depth analysis of legislative compliance application strategies.

Nell prides herself on her real-world approach in the risk assessment process - she is a firm believer in the importance of the human element in risk assessment and analysis. Her long background of working "in the trenches" gives her a unique perspective on true vulnerabilities in regards to compliance and business continuity. Nell is founder and president of the consulting firm, Cyrene Technologies, LLC.

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
21 CFR Part 11 Compliance for SaaS/Cloud Applications - 80202SEM

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed