Close Contact Us
Tap Here To Call Us
Updated:

Webinar: Privacy and Information Security – Best Practices and Imperatives

Robert E. Braun, chair of JMBM’s Cybersecurity & Privacy Group, will be the keynote speaker for the webinar, Privacy and Information Security – Best Practices and Imperatives.

Date: Wednesday, May 27, 2020

Time: 2:00 PM Pacific Time

Register Now

As companies shift to a remote working environment due to the Coronavirus pandemic, many find themselves challenged with issues involving privacy and data security.

On May 27, 2020, JMBM partner Bob Braun will discuss best practices for achieving security in order to take advantage of new opportunities and avoid threats as part of LINKCO’s exclusive webinar series.

Don’t miss a chance to learn about Cybersecurity, privacy and info technology adjustments being made with the COVID reality.

Some topics covered will include:

  • Cybersecurity
  • Information Technology
  • Privacy
  • Regulation Themes

Register Now for This Exclusive Webinar

Robert E. Braun is the co-chair of the Cybersecurity and Privacy Law Group at Jeffer Mangels Butler & Mitchell LLP. Bob helps clients to develop and implement privacy and information security policies, negotiate agreements for technologies and data management services, and comply with legal and regulatory requirements. He helps clients to develop and implement data breach response plans, and he and his team respond quickly to clients’ needs when a data breach occurs. Contact Bob at RBraun@jmbm.com or +1 310.785.5331.

JMBM’s Cybersecurity and Privacy Group counsels clients in a wide variety of industries, including accounting firms, law firms, business management firms and family offices, in matters ranging from development of cybersecurity strategies, creation of data security and privacy policies, responding to data breaches and regulatory inquiries and investigations, and crisis management. The Cybersecurity and Privacy Group uses a focused intake methodology that permits clients to get a reliable sense of their cybersecurity readiness and to determine optimal, client-specific approaches to cybersecurity.

Contact Us