Companies must make a myriad of decisions in the first 48 hours after a breach that will impact the rest of the breach investigation. At the recent Georgetown Cybersecurity Law Institute, a panel of outside and in-house counsel and a forensic investigator shared their advice about breach response, including a “quick start” guide, the common mistakes they see companies make during the initial response, what outside counsel will ask when they are contacted about a breach, what to look for (and what to beware of) when choosing a forensic team, how to preserve privilege throughout the investigation, and how to know when to stop looking for the hacker. See also “A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation”: Part One (Apr. 27, 2016), Part Two (May 11, 2016), Part Three (May 26, 2016).
Jun. 22, 2016
Jan. 2, 2019
The Cybersecurity Law Report’s Most-Read Articles of 2018
Jan. 9, 2019
Ten Cyber and Privacy Resolutions for the New Year
Jan. 9, 2019
GDPR Provides Model for Privacy and Security Laws in Latin America and Asia (Part One of Two)
Jan. 16, 2019
Key Cyber Threats and Targets for 2019
Dec. 12, 2018
Illinois Appellate Decision Creates Split on Standing to Sue Under BIPA
Webinar: Building a Strong Relationship Between Privacy and Information Security Teams for Effective Data Protection
Join the Cybersecurity Law Report on January 24, 2019, from 12:00pm-1:00pm EST, for a complimentary webinar about how privacy and security professionals can effectively coordinate for strong data protection programs. Dan Koslofsky, associate general counsel at Gap Inc., and Aaron Weller, co-founder and strategy VP for Sentinel LLC, will join the Cybersecurity Law Report’s Jill Abitbol to discuss, among other topics, the evolving roles of privacy and security professionals and practical examples of best practices for successful communication and coordination of efforts. Registration information is here.