The Pros and Cons of Performing Security Assessments Under Privilege

The Pros and Cons of Performing Security Assessments Under Privilege

Tuesday, March 10, 2026 3:30 PM to 4:30 PM · 1 hr. (US/Pacific)
Level 3 | Murano 3201B
Education Sessions
Cybersecurity

Information

A security assessment, such as a HIPAA Security Rule risk analysis, can reveal all of an organizations greatest vulnerabilities. In the hands of a hacker, it can serve as a roadmap of how to attack the organization. In the hands of a plaintiff’s attorney or regulator, it can serve as damning evidence of information security failures. In 2024, the Federal Trade Commission placed a healthcare provider under a 20-year consent order for deceptive trade practices because it claimed that it was HIPAA-compliant but the results of its independent HIPAA gap assessment found only 60-percent compliance. One method to protect the confidentiality of a risk assessment or compliance review is to conduct it under the direction of legal counsel and claim the benefit of attorney-client privilege. This session will explore the pros and cons of such an approach, such as the benefits of a claim of privilege; the extra time, cost, and burden of involving legal counsel; and the risks that a claim of privilege will fail and the assessment will be used against the organization. The session also will discuss the operational elements of performing an assessment under the direction of counsel, with practical tips and strategies.

Topic
Cybersecurity Governance
Target Audience
CFO/VP Finance/Compliance OfficerCIO/CTO/CTIO/Senior ITCISO/CSO
Level
Intermediate
Format
Best Practice
CEU Type
ACHEACPEAHIMACAHIMSCMECNECPDHTSCPHIMSGIAC CPEIAPP
Contact Hours
1.00
Learning Objective #1
Describe the elements of attorney-client privilege and how they can be achieved with respect to an information security assessment
Learning Objective #2
Identify the risks that, despite the involvement of an attorney, a security assessment performed under privilege can still be used against the organization
Learning Objective #3
Discuss what steps are - and just as importantly, are not - necessary to create a strong claim that a security assessment is privileged and confidential
Session #
61

Log in

See all the content and easy-to-use features by logging in or registering!