Webcast: Data Breach Response – Technologies, Techniques and Technicalities


1:00 p.m. - 2:00 p.m. ET

Event Details

The retention of prolific sensitive, personal electronic information has essentially become a responsibility inherent in the conduct of modern business. From the maintenance of medical records by a healthcare provider to the storage of credit card numbers and even security questions and answers by online shopping vendors, retaining, preserving and protecting personal health information (PHI) and personal identifiable information (PII) has become just one cost of doing business in today's electronic age.

Unfortunately, the unintended release of this information -- whether from cyberattacks, malicious employees, or even inadvertence -- presents a constant and ever-increasing risk. And when sensitive information is released, organizations and their counsel must respond swiftly to identify precisely what was released and who was affected, to fully assess impact and discharge breach notification obligations.

Join experts from OpenText as they explore the current and future technologies and techniques used to accomplish these objectives, and the technicalities that must be considered along the way. Register for this upcoming webcast to hear from our experts on:

  • Workflows for effectively streamlining the data extraction and quality control process;
  • The application of artificial intelligence (AI) and analytics to enhance efficiency and accuracy; and
  • Pitfalls that need to be considered, addressed, and avoided


  • Tracy Drynan, Principal Consultant, OpenText
  • Thomas Gricks, Senior Principal Consultant, OpenText

Accreditation: CLE credits will be applied for immediately following the event to the following states: AL, AZ, CA, CT, GA, IL, MN, MO, NC, NJ, NY, RI, TN, TX, and WI. Please be sure to answer all required pop-ups and fill in your state and bar number in the post-event survey. For questions, please contact Jennifer Coniglio, [email protected].


1:00 p.m. - 2:00 p.m. ET