Companies must make a myriad of decisions in the first 48 hours after a breach that will impact the rest of the breach investigation. At the recent Georgetown Cybersecurity Law Institute, a panel of outside and in-house counsel and a forensic investigator shared their advice about breach response, including a “quick start” guide, the common mistakes they see companies make during the initial response, what outside counsel will ask when they are contacted about a breach, what to look for (and what to beware of) when choosing a forensic team, how to preserve privilege throughout the investigation, and how to know when to stop looking for the hacker. See also “A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation”: Part One (Apr. 27, 2016), Part Two (May 11, 2016), Part Three (May 26, 2016).
Jun. 22, 2016
-
TOPICS
-
ENTITIES
-
PEOPLE
How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach
- Kathryn PicansoCybersecurity Law Report
To read the full article
Continue reading your article with a CSLR subscription.
Most-Read Articles
-
Jan. 4, 2023
A Ransomware Tabletop’s 360-Degree Incident Response View: Days One to Four -
Jan. 11, 2023
Ten Cybersecurity Resolutions for Financial Services Firms in 2023 -
Jan. 4, 2023
FTC and $391-Million State AG Case Put Location Data Enforcement on the Map -
Jan. 18, 2023
Scrutiny Over Dark Patterns Presents Further Challenges in Online Contracting -
Jan. 18, 2023
A Sensitive Time for Location Data: Tips to Address New Rules and Vendor Standards
Webinar on Compliant International Data Transfers


Listen here to our discussion with our colleagues at Ethos Privacy, which took place on March 1, 2022, on how to approach international data transfer challenges.