Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly.
Examples of proactive and reactive guidance:
- — System data retentions to ensure appropriate sets are available for post breach analysis
- — Breach response workflow processes that integrate legal and technology resources
- — Post breach preservation considerations
Click here to view the materials from a webinar we recently hosted, providing practical guidance and workflow suggestions to change potential cacophony into symphony.
The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.