Data Security - Seven Crucial Steps to Achieving Legislative Compliance

Instructor: Nell Walton
Product ID: 700075
Training Level: Basic
  • Duration: 60 Min
This Data Security training will also give a detailed analysis of what went wrong at Card systems Solutions, which was the most publicized data breach of 2005.


This session will give a history of the first data breach legislation passed in the US (California SB 1386 - it was because of SB 1386 that data breach knowledge became public for the first time).

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD / USB Drive

One CD/USB is for usage in one location only.
(For multiple locations contact Customer Care)
CD/USB and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions

Last year became infamous for its endless round of data security breaches. By the end of 2005, the number of breaches were staggering. Companies had reported breaches due to hacking, stolen laptops, stolen computers, hacked passwords, social engineering, lost backup tapes as well as employee theft. According to the Privacy Rights Clearinghouse, by December 2005, more than 50 million personal information records had been reported as compromised. (In an ironic twist, even FTC Chief Deborah Platt Majoras received notification that her personal information had been stolen in a breach at shoe retailing giant, DSW.)

We will also give an update and analysis on the 23 state data breach notification laws that have been passed in the last year and give details on what’s happening at the federal level in regards to a nationwide federal data breach notification.

The webinar will provide a seven-step program that a company can use to aid with compliance with these various data privacy laws:

  1. Senior management commitment
  2. User buy-in - from the grassroots up
  3. How to do a reliable risk analysis and apply appropriate remediation (to include information that is covered by the new laws)
  4. Documentation
  5. Staff Training
  6. How to implement a CSIRT (Computer Security Incident Response Team) specifically for data security incidents
  7. Setting up a hotline and/or mechanism for reporting noncompliance and security issues.

This session will also give a detailed analysis of what went wrong at Cardsystems Solutions, which was the most publicized data breach of 2005.

What Will Attendees Learn?

  • California SB 1386 and other legislation
  • Seven Steps to Data Security Compliance
  • Choicepoint Inc. - What went wrong and why they are paying $15 million to the FTC

Who Will Benefit:

Audience designations who might be interested

  • Senior Management
  • CSO
  • Internal and External Auditors
  • Information Security Managers
  • Information Security Staff

Instructor Profile:

Nell Walton, has spent nearly 20 years as a database administrator, business and system analyst. She has worked in a wide range of sectors including the manufacturing, legislative, legal, financial and telecommunications industries. As a CISSP and CISA certified professional she has extensive experience in both security and compliance issues, especially for companies, which must comply with Sarbanes-Oxley, HIPAA, Gramm-Leach-Blilely, ISO 17799, VISA PCI standards and current privacy legislation. Her experience covers everything from network security to software development lifecycle control evaluation to in-depth analysis of legislative compliance application strategies.

Nell prides herself on her real-world approach in the risk assessment process - she is a firm believer in the importance of the human element in risk assessment and analysis. Her long background of working "in the trenches" gives her a unique perspective on true vulnerabilities in regards to compliance and business continuity. Nell is founder and president of the consulting firm, Cyrene Technologies, LLC.

Follow us :
REACH and RoHS Compliance: Gain a Deeper Understanding
Reduce costs for compliance with data integrity: 21 CFR Part 11, SaaS/Cloud, EU GDPR

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.

If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.

We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed