Data Breach Prevention and Response: Avoiding Potential Pitfalls and Implementing Best Practices to Protect Your Company

In This Presentation:

- Overview of data breach landscape

- Data breach response

..Technical best practices

..Legal best practices

- Data breach prevention

..Technical best practices

..Legal best practices

- Excerpt from Overview of data breach landscape:

..Attacks continued at a high level

..Cyber-espionage is understood to be an established tool, but hard to determine real volumes, since if you do it right, no one knows you’ve done it!

..A high percentage of the attacks were ultimately preventable

..While some attacks are very high tech, low tech attacks are very popular and often successful

..Perpetrators know this and exploit human weaknesses

Please see full publication below for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Foley Hoag LLP - Security, Privacy and the Law | Attorney Advertising

Written by:

Foley Hoag LLP - Security, Privacy and the Law
Contact
more
less

Foley Hoag LLP - Security, Privacy and the Law on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide