Companies must make a myriad of decisions in the first 48 hours after a breach that will impact the rest of the breach investigation. At the recent Georgetown Cybersecurity Law Institute, a panel of outside and in-house counsel and a forensic investigator shared their advice about breach response, including a “quick start” guide, the common mistakes they see companies make during the initial response, what outside counsel will ask when they are contacted about a breach, what to look for (and what to beware of) when choosing a forensic team, how to preserve privilege throughout the investigation, and how to know when to stop looking for the hacker. See also “A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation”: Part One (Apr. 27, 2016), Part Two (May 11, 2016), Part Three (May 26, 2016).
Jun. 22, 2016
How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach
- Kathryn PicansoCybersecurity Law Report
To read the full article
Jun. 10, 2020
After Capital One Ruling, How Will Companies Protect Forensic Reports?
Jun. 24, 2020
How to Comply With Key CCPA Notice and Consumer Request Requirements
Jun. 17, 2020
Privacy Settings May Serve as One-Step CCPA Opt-Out From Sale
May 27, 2020
How to Facilitate a Safe and Privacy Compliant Return to Work: Contact Tracing
May 13, 2020
How to Facilitate a Safe and Privacy Compliant Return to Work: Laws and Guidance
The Senior Editors of the Anti-Corruption Report and the Cybersecurity Law Report recently teamed up to present an update on the trends and hot topics in the anti-corruption, cybersecurity and data privacy spaces since the beginning of the year and what the publications will be focusing on in the coming months. A complimentary download of the webinar is available here.