Many different types of privacy breaches continue to plague organizations and their third-party service providers. Hear Rebecca Herold discuss:\\n \\n \\n
Data breach response plans – where are the holes?
\\n
Notification plans (or lack thereof)
\\n
How to involve and ensure the security of trusted vendors.