Need more options? Click Here for Advanced Search!

HR's Necessary Response to Cyber Warfare: How to Safeguard Proprietary, Sensitive, and Confidential Data in the Hacking World - On-Demand

HR's Necessary Response to Cyber Warfare: Safeguard Proprietary, Sensitive, & Confidential Data in the Hacking World - On-Demand

Product Code: YEWA072418D

Availability: In stock

Internet Special:
$249.00
Add Items to Cart

HR's Necessary Response to Cyber Warfare: How to Safeguard Proprietary, Sensitive, and Confidential Data in the Hacking World - On-Demand

Webinar now available On-Demand.


WEBINAR SNAPSHOT: Learn how to avoid cybersecurity threats and protect your organization’s proprietary, confidential, and/or sensitive data.



True or false:

  • The root cause of most cyber incidents is a failure of technological security measures? 
  • High ROI (return on investment) cybersecurity initiatives should focus on acquiring best-in-class security technology? 
  • Virtually every real-world cybersecurity incident has an insider issue at its core? 


If you don’t know the right answers to questions like these, you could be putting your company at serious risk for cybersecurity breaches.

Nowadays, you don’t just need to guard against third-party hackers, either. Disgruntled or “rogue” employees are often an employer’s worst enemy concerning the compromise of proprietary, confidential and/or sensitive data.

And, while hackers always seem to be working on finding new ways to penetrate cybersecurity barriers, there are steps you can take to prevent data breaches and avoid losing valuable market secrets to competitors in case you have an employee looking to steal and sell those secrets—or suffering the legal and PR consequences if customer or employee information is exposed.

To guard against such threats, employers need to consider implementing protection tools to avoid or be able to track such activity. Email enterprise vaults, key stroke surveillance, and anti-deletion programming are among the tools that can ensure an organization’s valuable information is protected.

Use this on-demand webinar for an in-depth look at the legal steps you can take as an employer to avoid cyber threats and protect your company’s data with Attorney Daniel Nelson, a Certified Ethical Hacker, of Armstrong Teasdale. He’ll provide recommendations on how to protect sensitive company data and trade secrets from being breached by cyber threats, whether internal or external, and how to do so within legal limits.

Plus, you’ll learn:

  • The importance of taking necessary steps to ensure cybersecurity for your company’s sensitive data, personal information, and trade secrets
  • How email enterprise vaults, key stroke surveillance, and anti-deletion programming can be effectively used to protect an organization’s valuable data
  • A thorough list of cyber activity-related do’s and don’ts for your employee handbook
  • How to train (and retrain) employees to respect handling company data—many employees have no idea what is sensitive and why
  • How far you can legally go in governing security for off-site employees or those using their phones, etc., for work-related issues
  • Legal ramifications for your organization if there is a breach and how you can track possible breaches by insiders
  • Case studies—and how not to repeat the mistakes of others
  • And much more!

About Your Presenter:

Daniel C. Nelson, Esq.Daniel C. Nelson, Esq. 
Partner, Co- Chair, Data Security & Privacy Practice Group 
Armstrong Teasdale

Daniel Nelson is both a commercial litigator and a privacy and data security lawyer. Mr. Nelson is among the few U.S. attorneys to hold the title of Certified Ethical Hacker (C|EH), which means he has been trained to break into computers, but for the right reasons. His combined interest in technology and the desire to help clients protect their privacy and sensitive data motivated him to take the unusual step of becoming what’s known as a “white hat” hacker. In addition to his ethical hacking credential, Mr. Nelson is a Certified Information Privacy Professional (CIPP/US). This credential means that he knows privacy laws and regulations and how to apply them.

Mr. Nelson’s special training and experience enhances his ability to help clients protect against and prepare for data breaches and other cybersecurity incidents. He assists clients in the creation, implementation and enforcement of privacy and security policies and data breach plans. This guidance includes counseling on appropriate cybersecurity insurance coverage and risk assessment engagements. He also assists businesses with understanding their duties to retain and protect sensitive information, including privacy and document retention requirements. In the event of a cyberattack, Mr. Nelson serves as a data breach/cyber incident coach. His knowledge of both the technical details of likely breaches and the attendant legal and business impacts enables him to provide clients the information needed from both a technical and legal standpoint.

Mr. Nelson also represents plaintiffs and defendants in commercial cases and has tried some 40 cases to verdict in both state and federal courts. In recognition of his achievements, The Best Lawyers in America® named him “St. Louis Lawyer of the Year” for real estate litigation, as well as listed for commercial litigation.

    Write Your Own Review