Chapter 1 – Cybersecurity is (Not) an IT Issue
Chapter 2 – Effective Cybersecurity Principles for Boards of Directors
Chapter 3 – Structuring for the Digital Age
Chapter 4 – A Modern Approach to Assessing Cyber Risk
Chapter 5 – The Role of HR Functions in Scaling Cybersecurity and Building Trust
Chapter 6 – Cybersecurity and the Office of the General Counsel
Chapter 7 – Cybersecurity Audit and Compliance Considerations
Chapter 8 – Cyber Supply Chain and Third-Party Risk Management
Chapter 9 – Technical Operations
Chapter 10 – Crisis Management
Chapter 11 – Cybersecurity Considerations During M&A Phases
Chapter 12 – Developing Relationships with the Cybersecurity Team
The General Counsel can be an important force in mitigating cyber risk. This chapter provides a roadmap for playing that important role both proactively and reactively, and for doing so in conjunction with the organization’s CISO, while helping to build support from the C-Suite and Board of Directors.
Combining Technology, Public Policy and Economics to Create a Sustainable System of Cybersecurity
| 703-907-7090
| admin@isalliance.org
| 2500 Wilson Blvd, #245
Arlington, Virginia 22201
USA
ISA provides cybersecurity expert testimony and thought leadership in government and serves as an expert witness to the press.
Jim Halpert, an attorney at DLA Piper, has extensive experience helping clients on the full range of data risk issues domestically and internationally and across most sectors. He is rated as a Legal 500 “Hall of Fame” practitioner, as a Tier 1 lawyer by Chambers & Partners and as a BTI “client service all-star”. He has helped draft almost all the state privacy, security and breach notice laws enacted over the past 15 years, the National Association of Corporate Directors Cyber Risk Handbook, and two major US federal privacy laws. He advises clients regarding compliance, crisis management, corporate governance, and risk management strategies relating to transnational, federal and state security and privacy regulation, industry best practices and self-regulatory initiatives. He has helped clients through more than 600 cybersecurity incidents, including several of the most high-profile breaches in the world, and has helped over a hundred clients shape their preventive cybersecurity and privacy programs.