Regulatory and Administrative Law Videos

Radio Entrepreneurs (3:01)

Presented By Robert J. Munnelly, Jr.
Rob Munnelly provides insight on a range of company protections that will ensure quick recovery from a data breach. Listen to full podcast here.

Data Breach Planning 2.0 (1:15:25)

Presented By Robert J. Munnelly, Jr.
In this Data Breach Planning 2.0 program, Robert J. Munnelly, Jr., Mark Spencer, and Patrick T. Clendenen outline breach response preparation, responding to computer and network breaches, minimizing potential exposure to sanctions and litigation risks, and responding effectively to litigation.

Breach Planning and Regulatory Requirements (21:53)

Presented By Robert J. Munnelly, Jr.
Rob Munnelly provides an overview on breach planning, including developing an incident response plan, identifying internal breach response teams and external data security resources, and developing action items for the initial hours and days following a suspected breach.

Responding to Computer/Network Compromise (26:14)

Presented By Mark Spencer
Mark Spencer of Arsenal Consulting discusses how people are compromised, how to reduce risk and identify a breach at the earliest possible opportunity, digital forensics, and shares several interesting case studies.

Data Security Planning 2.0 (1:42:32)

Presented By Robert J. Munnelly, Jr.
In this Data Security Planning 2.0 program, Robert J. Munnelly, Jr., Nick DeLena, and Charles Bellingrath outline best practices for business owners and executives to help strengthen data security by enhancing existing programs and computer security practices, and ensuring proper cyber insurance coverages are in place.

Creating Written Information Security Plans (WISPs) (25:37)

Presented By Robert J. Munnelly, Jr.
Rob Munnelly provides an overview of WISPs, including the requirements under Massachusetts law, and outlines key elements involved in developing and maintaining strong plans.

Building Strong IT Controls (37:11)

Presented By Nick DeLena
Nick DeLena of OCD Tech reviews the more technical aspect of WISPs and ways to improve security posture organizationally, including identifying and classifying data, logical access, access monitoring and alerting, encryption, perimeter protection, operating system security, patch management, malware protection, and awareness and training.

The Evolving Liabilities: Cyber Privacy & Security Exposures (27:18)

Presented By Charles Bellingrath
Charles Bellingrath of ARC Excess & Surplus, LLC provides an overview of cyber insurance, including coverages and potential costs involved when breaches occur.

Radio Entrepreneurs (4:49)

Presented By Robert J. Munnelly, Jr.
Rob Munnelly joins Radio Entrepreneurs to discuss data security related challenges and the importance of developing a WISP that complies with state law. Listen to full podcast here.

Radio Entrepreneurs (4:47)

Presented By Robert J. Munnelly, Jr.
Regulatory and Administrative law attorney Rob Munnelly talks to Radio Entrepreneurs about the importance of information security and the priorities entrepreneurs need to consider with this important topic. Listen to full podcast here.