WHAT WE’LL COVER

Item No. 1
Understanding Data Privacy and Cyber Risk exposures

Item No. 2
How to craft a cyber response plan

Item No. 3
How Human Resources factors into risk management