• Online, Instructor-Led
  • Online, Self-Paced
Course Description

A cybersecurity incident has occurred: what is the next step? If your organization has had valuable information exfiltrated from its network, such as personally identifiable information (PII), personal health information (PHI), trade secrets, or other valuable information, there could be major repercussions. Once the initial incident response phase has ended, and the dust has settled the question then becomes: “Now what!?!” This course examines the types of potential liability an organization or its employees may face following a cybersecurity incident as well as provide practical insights about how they may play out in the courts, with regulators, with customers, and with other stakeholders. There will also be a brief examination of the history of cybercrime and criminal statutes that apply to various cyber-activities and their significance. In addition, the course will highlight resources that organizations can draw on after a cybersecurity incident including law enforcement and insurance providers.

Learning Objectives

Understand the various legal liabilities a company may face following a cybersecurity breach, including a focus on civil liability. Analyze the facts of a particular cybersecurity incident through a legal lens. Apply the law (types of liability) as described in lectures to a set of particular facts to identify potential legal liability. Describe obligations when working with enforcement authorities, such as audit cooperation and communication.   

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Digital Forensics
  • Incident Response
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.