Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly.
Examples of proactive and reactive guidance:
-
— System data retentions to ensure appropriate sets are available for post breach analysis
-
— Breach response workflow processes that integrate legal and technology resources
-
— Post breach preservation considerations
Click here to view the materials from a webinar we recently hosted, providing practical guidance and workflow suggestions to change potential cacophony into symphony.