Driven Governance
January 16, 2015
Custodial Interviews: You’re Doing it Wrong
February 9, 2015

Government Contractors: Guide to Preventing Security Leaks

The government relies on your company and employees to keep data secure. It is a daunting task. Even slight security failures could create real harm for your company. The headlines remind us that nations, cyber criminals, and rogue employees, are penetrating computer systems at an accelerating pace.

Join us for the answers to 5 Key Questions:

  • What steps should federal contractors take to protect government data?
  • What can anyone truly do to detect a rogue employee?
  • What special rules exist for Intelligence Community and Department of Defense Contractors?
  • What happens if the government wants to examine our company’s computer systems?
  • What is a compliance and ethics program, what does it cost, and how can it help?

 

Tara Emory, PMP
Tara Emory, PMP
Tara Emory advises organizations and law firms on e-Discovery and information governance programs. Tara counsels clients on data management and compliance, policies, records management technology, and defensible deletion. In litigation, she is an expert on search methodologies, data preservation and collection approaches, discovery protocols, and strategies for resolving discovery issues with litigation adversaries, government regulators, and the courts. Above all, Tara seeks to solve her clients’ unique data problems in ways that reflect a best fit for each client and matter.
X