• Mail
  • Linkedin
  • Twitter
Hire Us
Law and Forensics
  • Home
  • Products
  • Services
    • Cybersecurity Services
      • Assessments
      • Board Consulting
      • Data Governance
      • Due Diligence
      • Financial Institutions
      • Incident Response
      • Investigations
      • Privacy
      • Tabletops
    • eDiscovery Services
      • Consulting
      • Data Preservation
      • Expert Witness
      • Training Practice
    • Forensic Services
      • Cloud Computing
      • Consulting
      • Expert Testimony
      • Internet of Things
      • Investigations
      • Mobile Device
      • Dispute Resolution Services
      • Social Media
      • Server Forensics
  • Insights
  • About Us
  • Search
  • Menu
  • Managing the Supply Chain Risk and Strategies to Manage...

    WEBINAR

Format: On Demand
Duration: 1 Hour 5 Minutes

Register

About This Webinar

This CLE will examine the business, security, and legal issues related to using third-party vendors.
An organization’s information security activities should begin before it undertakes transactions as vendor or purchaser. Cybersecurity strategy should be informed by laws and regulations – federal, state, local, and international (at national, regional, provincial, and local levels) – to which the organization is subject. From the purchaser’s perspective, vendor selection should also be informed by the purchaser’s specific requirements and expectations regarding the information and information systems relevant to the vendor relationship.
Panelists will discuss procuring organizations, vendors, and their respective counsel to address information security requirements in their transactions. They will frame the issues parties should consider consistent with common principles for managing cybersecurity risk. Parties should also contemplate transactions from due diligence and vendor selection through contracting and vendor management. Cybersecurity provisions are not “one-size-fits-all,” but should instead be informed by parties’ assessment of risk and strategies to mitigate risk.

This course is brought to you by the Global Cyber Institute and Thomson Reuters and it is national accredited (get CLE in all 50 states).

Topics that will be discussed:

  1. Strategies on how to evaluate vendors
  2. Legal concepts related to liability for vendor data breaches
  3. Language to consider using when drafting vendor contracts
  4. Strategies and techniques to utilize to demonstrate compliance with new regulatory requirements.

Who should attend?

  • Lawyers
  • Insurance executives
  • In-house counsel
  • Business executives
  • Privacy attorneys

Speakers

  • Daniel Garrie, Law & Forensics
  • David A. Cass – Chief Information Security Officer, IBM Cloud & SaaS Operational Services
  • Steven Chabinsky – Partner, White & Case

Attending the webinar

If you would like to attend the program, please click this link and add the program to your “Cart.” Please note you may need to click the link twice to reach the webinar’s page. To register for the program for free please use the following code: LNF100. When checking out please make sure that you only have this webinar in your cart, otherwise you may encounter problems when checking out. If you know someone who might be interested in this webinar, please forward this email to them.

About Law & Forensics

Law & Forensics is a strategic consulting firm with a global presence that assists clients with sensitive and complex electronic discovery, information governance, computer forensic, information security, and privacy issues. With a strong record for getting results, reducing costs, mitigating legal risks, and delivering value, Law & Forensics provides corporations, government agencies, law firms and other legal, business, and technology stakeholders with solutions to address complex litigations, sensitive investigations, and regulatory inquiries.

Read More

Webinars

  • Cyber Acts of War in the…

  • Review of Cybersecurity Insurance Case Law

  • Managing Disputes in the Life Sciences…

  • Live CLE: Survey of Patent Law…

  • Live CLE: Cybersecurity Guidelines from Regulatory…

Newsletter

Contact Us

Contact Us
Sales Inquiry
​Press Inquiry
​Speaking Inquiry
Job Inquiry

CYBERSECURITY PRACTICE

Assessments
Board Consulting
Data Governance
Due Diligence
Financial Institutions
Incident Response

Investigations
Privacy
Tabletops

EDISCOVERY PRACTICE

Consulting

Data Preservation
Expert Witness

Training Practice

FORENSICS PRACTICE

Cloud Computing
Consulting
Expert Testimony
Internet of Things
Investigations
Mobile Device
Dispute Resolution Services
Social Media
Server Forensics  

ARTICLES

Browse All Articles

LECTURES

Browse All Lectures

RECOURSES

About Us
Events
Search

Law & Forensics © 2020. All Rights Reserved
  • Privacy Policy
  • Legal Notices
Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

OKLearn more

Cookie and Privacy Settings

How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

Google Analytics Cookies

These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.

If you do not want that we track your visist to our site you can disable tracking in your browser here:

Other external services

We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy