News & Analysis as of

Work-Product Doctrine Cyber Incident Reporting

BCLP

Navigating a Security Incident - Best Practices for Engaging Service Providers

BCLP on

Organizations experiencing a security incident must grapple with numerous competing issues simultaneously, usually under a very tight timeframe and the pressure of significant business disruption. Engaging qualified service...more

Epiq

Cyberside Chats: Preserving Legal Privilege After a Cybersecurity Incident

Epiq on

Jerich Beason is joined by Melissa Parisi of Herbalife Nutrition and Caroline Morgan of Culhane Meadows to discuss the topic of retaining privilege after engaging a cyber attorney during or after a cyber incident. An...more

Akin Gump Strauss Hauer & Feld LLP

Protecting Privilege: Top 10 Checklist for Cybersecurity Forensic Investigation Reports

- In ongoing multidistrict litigation concerning Capital One’s 2019 data breach, Capital One succeeded in defeating a motion to compel disclosure of a privileged root cause analysis conducted by PwC. - In contrast to an...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide