{"id":12662,"date":"2023-06-21T13:11:32","date_gmt":"2023-06-21T17:11:32","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/academics\/continuing-legal-education\/new-design-compliance-legal-risk-podcast\/s1-e4-2\/"},"modified":"2025-05-12T15:17:34","modified_gmt":"2025-05-12T15:17:34","slug":"s1-e3","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/academics\/lifelong-learning\/compliance-legal-risk-podcast\/s1-e3\/","title":{"rendered":"S1 E3 | Cyber Breach Response"},"content":{"rendered":"<h2>Introduction<\/h2>\n<h3>In Episode 3,\u00a0<a href=\"https:\/\/www.stantec.com\/en\/people\/c\/chen-angeline\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.dlapiper.com\/en\/us\/people\/c\/chen-angeline\/&amp;source=gmail&amp;ust=1630090118318000&amp;usg=AFQjCNHb_aR2RYpySm7fsB-0HKcQEmAPtQ\" class=\"cx_external_link\"><span class=\"cx_external_hyperlink\">Angeline Chen<\/span><span class=\"visually_hide\">(This link opens in a new tab)<\/span><span class=\"cx_external_icon\"><\/span><\/a>\u00a0and\u00a0<a href=\"https:\/\/www.ey.com\/en_gl\/people\/bodo-meseke\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.ey.com\/en_gl\/people\/bodo-meseke&amp;source=gmail&amp;ust=1630090118318000&amp;usg=AFQjCNGyZwzJqKs-TedRrZ29XU8_ve9aAw\" class=\"cx_external_link\"><span class=\"cx_external_hyperlink\">Bodo Meseke<\/span><span class=\"visually_hide\">(This link opens in a new tab)<\/span><span class=\"cx_external_icon\"><\/span><\/a>\u00a0Provide Insights on Responding to Cyber Breaches.<\/h3>\n<p>Topics discussed\u00a0include, among other things:<\/p>\n<div>\n<ul>\n<li>What cyber breaches are<\/li>\n<li>The different types of cyber breaches<\/li>\n<li>A cyber breach case study<\/li>\n<li>Suggestions for lawyers and company executives<\/li>\n<\/ul>\n<p><script src=\"https:\/\/www.buzzsprout.com\/1737484\/9117646-season-1-episode-3-cyber-breach-response.js?container_id=buzzsprout-player-9117646&amp;player=small\" type=\"text\/javascript\" charset=\"utf-8\"><\/script><br \/>\n<span style=\"font-size: 16px;\">____________________________________________________________________<\/span><\/p>\n<\/div>\n<h2>Flyers and Resources<\/h2>\n<h3><strong>Disclaimer<\/strong><\/h3>\n<p><em>Thanks for checking out our additional content! Additional content was written\/prepared by the Host or present\/past Georgetown Law team members. <\/em><\/p>\n<p><em>Our Articles may contain references to, or short excerpts from, specific statements in the Compliance &amp; Legal Risk podcast episodes. Please note, to benefit the Article format, in many instances, statements referenced or quoted in an Article may have been edited or shortened, may only focus on one portion of a speaker\u2019s answer to a question or commentary on an issue, or may have had certain interim questions\/statements removed. We also repeat certain phraseology in all or many of our articles to aid listeners in comparing articles across episodes and to ensure our listeners have easy access to helpful episode information. For additional context and complete speaker answers, we always encourage you to listen to the full relevant podcast episode!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In Episode 3,\u00a0Angeline Chen(This link opens in a new tab)\u00a0and\u00a0Bodo Meseke(This link opens in a new tab)\u00a0Provide Insights on Responding to Cyber Breaches. Topics discussed\u00a0include, among other things: What [&hellip;]<\/p>\n","protected":false},"author":13063,"featured_media":0,"parent":12622,"menu_order":11,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-12662","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/pages\/12662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/users\/13063"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/comments?post=12662"}],"version-history":[{"count":0,"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/pages\/12662\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/pages\/12622"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/academics\/wp-json\/wp\/v2\/media?parent=12662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}