BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20160628T153000Z
DTEND:20160628T163000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Protect\, Detect\, Restore\, Recover: How to Prevent\, And Survive\, A Data Breach
DESCRIPTION:Cybercriminals have your business in their sights. In the Information Economy\, Information is Power\; greater than 50% of all business assets are information assets. Trade secrets\, confidential client data\, protected health information\, and Personally Identifying Information of employees and customers (and their families) are highly valuable to cyber thieves. This makes your business a target.\n\n \n\nCalifornia and federal law requires your business to secure sensitive information\, destroy it properly when no longer necessary\, and notify consumers in the event of a breach. What do you need to do? Come to our workshop and learn:\n\n\n	How you can satisfy the legal requirement of "Reasonable Security" without blowing up your budget.\n	The consequences for businesses that are not in compliance.\n	The minimum level of security and privacy protection you must employ.\n	The required steps to take in the event of a data breach.\n\nJoin Patrick Fraioli\, Esq. for this interactive\, practical seminar.
X-ALT-DESC;FMTTYPE=text/html:<div><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:verdana\;">Cybercriminals have your business in their sights. In the Information Economy\, Information is Power\; greater than 50% of all business assets are information assets. Trade secrets\, confidential client data\, protected health information\, and Personally Identifying Information of employees and customers (and their families) are highly valuable to cyber thieves. This makes your business a target.<br />\n&nbsp\;<br />\nCalifornia and federal law requires your business to secure sensitive information\, destroy it properly when no longer necessary\, and notify consumers in the event of a breach. What do you need to do? Come to our workshop&nbsp\;and&nbsp\;learn:</span></span></span>\n\n<ul>\n	<li style="color:#505050\;line-height:15.75pt\;"><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:verdana\;">How you can satisfy the legal requirement of &ldquo\;Reasonable Security&rdquo\; without blowing up your budget.</span></span></span></li>\n	<li style="color:#505050\;line-height:15.75pt\;"><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:verdana\;">The consequences for businesses that are not in compliance.</span></span></span></li>\n	<li style="color:#505050\;line-height:15.75pt\;"><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:verdana\;">The minimum level of security and privacy protection you must employ.</span></span></span></li>\n	<li style="color:#505050\;line-height:15.75pt\;"><span style="color:#000000\;"><span style="font-size:14px\;"><span style="font-family:verdana\;">The required steps to take in the event of a data breach.</span></span></span></li>\n</ul>\n<span style="font-size:14px\;"><span style="font-family:verdana\;"><span style="color:#000000\;"><em>Join</em></span>&nbsp\;<em><span style="color:#505050\;"><a href="http://www.ecjlaw.com/attorneys/patrick-a-fraioli-jr/" target="_blank"><span style="text-decoration:none\;text-underline:none\;"><span style="color:#336699\;">Patrick Fraioli\, Esq</span></span></a>.&nbsp\;</span><span style="color:#000000\;">for&nbsp\;this interactive\, practical seminar.</span></em></span></span><br />\n&nbsp\;</div>\n
LOCATION:Ervin Cohen & Jessup LLP 9401 Wilshire Blvd.\, 9th Floor Beverly Hills\, CA 90212
UID:e.1702.11334
SEQUENCE:3
DTSTAMP:20260406T154739Z
URL:https://members.beverlyhillschamber.com/events/details/protect-detect-restore-recover-how-to-prevent-and-survive-a-data-breach-06-28-2016-11334
END:VEVENT

END:VCALENDAR
