Companies must make a myriad of decisions in the first 48 hours after a breach that will impact the rest of the breach investigation. At the recent Georgetown Cybersecurity Law Institute, a panel of outside and in-house counsel and a forensic investigator shared their advice about breach response, including a “quick start” guide, the common mistakes they see companies make during the initial response, what outside counsel will ask when they are contacted about a breach, what to look for (and what to beware of) when choosing a forensic team, how to preserve privilege throughout the investigation, and how to know when to stop looking for the hacker. See also “A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation”: Part One (Apr. 27, 2016), Part Two (May 11, 2016), Part Three (May 26, 2016).
Jun. 22, 2016
How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach
- Kathryn PicansoCybersecurity Law Report
To read the full article
Sep. 29, 2021
SEC Cybersecurity Disclosure Enforcement Heats Up: Best Practices
Sep. 22, 2021
SEC Cybersecurity Disclosure Enforcement Heats Up: Recent Developments
Oct. 6, 2021
How to Build Insider Risk Programs to Satisfy Global Employee Privacy Laws
Oct. 20, 2021
Lessons From the WhatsApp Decision on GDPR Transparency Requirements: Enforcement Takeaways
Oct. 13, 2021
New Pressures Shift Best Practices for Ransomware Crisis Communications
In this quick take video, we talk about some of our cybersecurity resolutions for 2021.