Interop ITX 2018 Schedule Viewer

View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.

Filter by pass type to see which sessions your pass makes you eligible to attend. Please note that adding a session to your agenda here does NOT guarantee you a seat. Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend.

Check back often as we will be adding more sessions and speakers frequently. Please note that session dates and times are subject to change.

There is No "Breach" Until Your Lawyer Says There Is

Speaker:
Pass Types: All Access, Conference
Format: Conference Session
Track: Security
Audience Level: All
Recording: TBD

Incident response is a high stakes and high pressure event for any organization, no matter how sophisticated. And should it be determined that a network intrusion resulted in an actual "data breach," the stakes only get higher. Matters are complicated enough when the intrusion involves your network and your data. But what happens when the network that is infiltrated is that of a vendor hosting your companies' confidential data or the confidential data of your customers? Or if an intrusion onto your companies' network exposes confidential data that your company is hosting pursuant to a contract for a third party? Of course rapid detection, containment and remediation must be a priority in all such circumstances – but how should your organization structure its activities to avoid generating documents that can be used down the road by an adversary seeking to profit of your companies misfortune? And how do you tell if there is an actual data breach? (Hint – the answer varies state by state and, in some cases, regulator by regulator).

This session will cover:

  • Understanding the basic process of working on an incident response with counsel;
  • A description of the current legal environment, including some of the obligations and legal risks to companies that have suffered a cyber incident;
  • How to structure a privileged incident response to provide an organization with maximum protection against future discovery by litigants, while at the same time, meeting an organization's legal, contractual and regulatory obligations; and
  • A discussion of the special considerations (pre and post breach) of organization's who host data or whose data is hosted.