News & Analysis as of

Cyberforensics Cybersecurity

StoneTurn

Legal Investigations: Digging Deeper into White-Collar Crime and Financial Crime

StoneTurn on

White-collar and financial crimes have risen sharply, with the U.S. DOJ reporting a 300% increase in monetary recoveries in 2024. Successful investigations now require a proactive and adaptable approach to detect and prevent...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

HaystackID

[Webcast Transcript] From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators

HaystackID on

Editor’s Note: Read the transcript from HaystackID’s webcast, “From Mac to Mobile: Advanced Data Triage and Collection Tools for Forensic Investigators,” to learn about HaystackID’s Remote Endpoint Analysis and Data...more

HaystackID

From Evidence to Misinformation: Courts Brace for Deepfake Challenges

HaystackID on

As deepfake technology becomes increasingly sophisticated and accessible, courts are now facing unprecedented challenges in distinguishing authentic evidence from AI-generated fabrications. This issue, particularly critical...more

Troutman Pepper Locke

Does Every Incident Require a Forensic Report? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Troutman Pepper Locke

Should Companies Conduct Their Own Forensic Investigations? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper Locke on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

HaystackID

[Webcast Transcript] Targeted Remote Collections for iOS and Android Devices: Challenges and Considerations for Sourcing Tools and...

HaystackID on

Editor’s Note: In this insightful transcript of the educational webcast hosted by HaystackID on May 17, 2023, our expert panel discusses targeted remote collections for iOS and Android devices, focusing on the unique...more

Troutman Pepper Locke

Forensic Artifacts Play Legal Role in Cyber Incident Response

Troutman Pepper Locke on

When a business experiences a data security incident, there is invariably one principal question that the affected business wants answered: Who do we tell? Originally published in Law360 on December 2, 2022....more

Troutman Pepper Locke

The Do's and Dont's of Cybersecurity Forensic Investigations

Troutman Pepper Locke on

According to the Verizon Wireless 2022 Data Breach Investigations Report, there are four prominent paths that threat actors use to gain unauthorized access into an organization’s network... Originally published in Law360 on...more

Troutman Pepper Locke

Can Cyber Investigations Be Canned? - Unauthorized Access Podcast

Troutman Pepper Locke on

Can cyber investigations be canned? Find out what Sadia, Kamran, and this month’s guest, Shawn Tuma of Spencer Fane, have to say. The gloves come off as these three breach coaches duke it out for the final word on this topic....more

Ballard Spahr LLP

Another Federal Court Orders Production of Data Breach Forensic Report

Ballard Spahr LLP on

Following in the footsteps of the Eastern District of Virginia’s Capital One decision last year and the District of D.C.’s Clark Hill decision earlier this year, the Eastern District of Pennsylvania has just ordered the...more

HaystackID

[Webcast Transcript] Operationalizing Data Mapping: From Practices and Protocols to Proven Processes

HaystackID on

Editor’s Note: On June 23, 2021, HaystackID shared an educational webcast designed to inform and update legal and data discovery professionals on how to consider and operationalize data mapping processes utilized in the...more

Burr & Forman

Your Business Experienced a Ransomware Attack, and It Was Not Prepared – Now What?

Burr & Forman on

It is hard to find a news post without a story on a ransomware attack. The National Security Council has issued an open letter warning all businesses to be alert and prepared for ransomware attacks.  Various industry groups...more

Oberheiden P.C.

5 Keys to Picking the Best Digital Forensics Company

Oberheiden P.C. on

From investigating cybersecurity breaches to conducting discovery in civil litigation, the practice of digital forensics plays an essential role in many aspects of companies’ compliance, data protection, and risk management...more

Association of Certified E-Discovery...

[Webinar] How To Prepare for Cybersecurity and Respond to a Data Breach - November 19th, 12:00 pm - 1:00 pm CT

Consilio, SecureIT360 and Polsinelli will take a deep dive into responding to a cyber-attack and data breach. Learn about what to expect when you arrive on the scene following a cyber incident, and best practices for what...more

Woods Rogers

Protecting Your Organization: Eastern District of Virginia Rules Cybersecurity Incident Report Not Privileged Work Product

Woods Rogers on

On May 26, 2020, in In re Capital One Consumer Data Security Breach Litigation, MDL 1:19md2915 (E.D. Va.) the Federal District Court for the Eastern District of Virginia (Alexandria Division) (Anderson, J.) held that a...more

Hinshaw & Culbertson - Insights for Insurers

Capital One Loses Bid to Shield Post-Breach Report from Consumer Plaintiffs

On June 25, a Federal District Court in Virginia (Anthony J. Trenga, U.S.D.J.) affirmed a Magistrate Judge's Order requiring Capital One to produce a vendor's post-breach forensic report to plaintiffs in a consumer class...more

Hinshaw & Culbertson - Insights for Insurers

No Protection for Vendor's Forensic Report in Post-Breach Litigation? - Preserving Privilege and Work Product Protection in Light...

A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more

Womble Bond Dickinson

Federal Court Finds Cybersecurity Forensic Report Not Privileged Under Attorney Work Product Doctrine

Womble Bond Dickinson on

The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more

Nelson Mullins Riley & Scarborough LLP

The Techno Security and Digital Forensics Conference: 20 Years of Education and Innovation

The Techno Security and Digital Forensics Conference held its 20th session in Myrtle Beach. This conference is attended by corporate professionals, law enforcement and academia from around the world to keep up with the...more

Bradley Arant Boult Cummings LLP

Top 10 Things to Do in the Event of a Data Breach

This webinar focuses on strategies for mitigating reputational, litigation, and regulatory risk in the post-data breach environment. We will offer specific practice tips to implement during this crisis period that are...more

BakerHostetler

Deeper Dive: Forensics

BakerHostetler on

A company’s ability to quickly and efficiently conduct a forensic investigation is critical to limiting the impacts of a data security incident and determining the scope of the incident. In BakerHostetler’s 2017 Data...more

King & Spalding

Casino Owner Sues Cybersecurity Services Provider, Alleging Botched Response to Data Breach

King & Spalding on

On December 24, 2015, Nevada casino owner Affinity Gaming filed suit against Trustwave in federal district court, alleging that Trustwave failed to contain and remediate a data breach at Affinity Gaming. ...more

BakerHostetler

How and Why to Pick a Forensic Firm Before the Inevitable Occurs

BakerHostetler on

A forensic investigation by a security firm often does (and should) drive decision-making in response to an incident. Because the work of a security firm usually drives the critical path of a response, companies can become...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide