Pre-Recorded Executive Brief: New breach notification laws encourage stronger security controls.

Background

New state laws require companies to notify customers if their data was compromised as a result of a security breach. These requirements can significantly affect your IT risk management practices.

Goal of the Brief

Understand the nature of new breach notification laws. Learn from 3 industry experts how to protect your business against financial and reputational loses associated with a data security breach.

Why This Matters

The new laws can result in significant losses for businesses that do not strengthen security controls. According to a Ponemon Institute survey, 20% of individuals notified of a breach immediately stopped doing business with the company that failed to secure their data. The companies suffered further losses due to the high costs of notifying the affected customers.

Why You Should Tune In

This web-based executive brief will explain how to mitigate the risks of data security breaches through robust access and identity management practices. We will review the latest breach notification laws and explain the role that access and identity management plays in protecting your customer's data. We will also highlight the benefits of IBM's access and identity management solutions.

Access the Pre-Recorded Webcast

To view the full webcast please click here.

This pre-recorded version of the executive brief includes audio and synchronized presentation slides.

To download just the MP3 audio file of the presentation (23MB), click here.

Speakers

Bob Kalka

Bob Kalka is a Security Business Unit Executive at IBM's Tivoli software division. Mr. Kalka has been with IBM for 17 years, where he has held a number of leadership positions in product management, sales, business development, marketing management and product development. He is a frequent international speaker on the relationship of business with Information Technology, on-demand computing and security, and has had numerous papers and articles published on these topics.

Benjamin Wright

One of the world's leading technology lawyers, Mr. Wright is the author of several law books, the most recent being Business Law and Computer Security, published by the SANS Institute. During 20 years of private practice, he has delivered many hundreds of lectures on e-commerce, privacy, e-mail discovery and computer security and been quoted in publications around the globe, from the Wall Street Journal to the Sydney Morning Herald. The journal of the Information Systems Audit and Control Association has recently published Mr. Wright's latest peer-reviewed article, 'The Costs of Not Securing Personally Identifiable Data'.

Lenny Zeltser

Lenny Zeltser leads the information security practice at Gemini Systems. He is also a Board of Directors member at SANS Technology Institute. Mr. Zeltser co-authored a number of security books, including Inside Network Perimeter Security and Malware: Fighting Malicious Code. Mr. Zeltser holds the CISSP certification and is one of the few individuals in the world who have earned the highly-regarded GIAC Security Expert (GSE) designation. Mr. Zeltser has an MBA degree from MIT Sloan and a BSE degree from the University of Pennsylvania.