Companies must make a myriad of decisions in the first 48 hours after a breach that will impact the rest of the breach investigation. At the recent Georgetown Cybersecurity Law Institute, a panel of outside and in-house counsel and a forensic investigator shared their advice about breach response, including a “quick start” guide, the common mistakes they see companies make during the initial response, what outside counsel will ask when they are contacted about a breach, what to look for (and what to beware of) when choosing a forensic team, how to preserve privilege throughout the investigation, and how to know when to stop looking for the hacker. See also “A Guide to Developing and Implementing a Successful Cyber Incident Response Plan: From Data Mapping to Evaluation”: Part One (Apr. 27, 2016), Part Two (May 11, 2016), Part Three (May 26, 2016).
Jun. 22, 2016
-
TOPICS
-
ENTITIES
-
PEOPLE
How to Avoid Common Mistakes and Manage the First 48 Hours Post-Breach
- Kathryn PicansoCybersecurity Law Report
To read the full article
Continue reading your article with a CSLR subscription.
Most-Read Articles
-
Nov. 20, 2024
SEC Charges Four Companies for Misleading Cyber Incident Disclosures: New Expectations? -
Dec. 11, 2024
Deciphering the New CPPA Proposed Regulations for Data Brokers -
Dec. 11, 2024
Preparing for U.S. State Law Privacy Compliance in 2025 -
Nov. 13, 2024
Unpacking the Second Circuit’s Bombshell VPPA Ruling -
Dec. 4, 2024
SEC Charges Four Companies for Misleading Cyber Incident Disclosures: Lessons on Contents and Procedures
We Celebrate Data Privacy Day 2024
Read the full brief here.