A company’s information security program may satisfy baseline notions of reasonable security (and may even be technically innovative), but how does it demonstrate reasonable technology deployment, staffing, and processes when faced with scrutiny from regulators, allegations by plaintiffs, or inquiries from business partners? Please join us for this seminar to learn what your company can be doing to better secure data.
Speakers will discuss how an in-house legal could evaluate a company’s information security program as reasonable and defensible, and how it can show that reasonable security is in place using typically generated artifacts of compliance. As the CCPA takes effect and regulatory scrutiny continues to intensify, the need to demonstrate implementation of reasonable security requirements has never been more critical.