News & Analysis as of

Incident Response Plans Information Governance Data Breach

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

HaystackID

[Webcast Transcript] Faster Finds, Fewer Files: A Smarter Approach to Email Investigations

HaystackID on

Editor’s Note: As digital threats become increasingly sophisticated and data volumes continue to surge, email remains a cornerstone of modern investigations. In this timely webcast, HaystackID® experts John Wilson and Rene...more

BakerHostetler

DSIR: Deeper Dive into the Data

BakerHostetler on

Every year, BakerHostetler collects, analyzes and compares key metrics on the incident response matters we handled in the prior year. The Data Security Incident Response (DSIR) Report presents key findings and trends, along...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

BakerHostetler

Deeper Dive into the Data - May 2024

BakerHostetler on

Every spring, BakerHostetler collects, analyzes, and compares key metrics on the incident response matters we handled in the prior year. The output – our Data Security Incident Response (DSIR) Report – highlights key findings...more

Association of Certified E-Discovery...

[Webinar] Mastering Information Governance: Strategies for Effective Data Management in the Evolving World of Cybersecurity - June...

Join us for an insightful webinar that will delve into the critical aspects of information governance and data management in the rapidly evolving field of cybersecurity. As organizations face escalating cyber threats, the...more

Hinckley Allen

Final Amendments to Regulation S-P under Securities Exchange Act of 1934

Hinckley Allen on

On May 15, 2024, the Securities and Exchange Commission (the “SEC”) issued final amendments (the “Amendments”) to Regulation S-P (originally adopted in 2000), which governs the treatment of a customer’s nonpublic personal...more

Epiq

Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind

Epiq on

“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It...more

Epiq

Moving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response

Epiq on

Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to...more

HaystackID

Cybersecurity Experts Urge Responsible AI Adoption, Not Overreliance

HaystackID on

Editor’s Note: This article covers valuable insights on artificial intelligence’s (AI) evolving role in cybersecurity and incident response shared during an expert panel discussion. As cybersecurity, information governance,...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

Association of Certified E-Discovery...

[Webinar] Information Governance and Cyber Security Breach Review: Best Practices - August 10th, 1:00 pm - 2:00 pm EDT

The best practice approach to effectively handling a data security incident starts with a proactive response plan. But when the inevitable occurs, will your plan stand up to the test? Join our panel of experts as they discuss...more

Hinshaw & Culbertson LLP

[Webinar] Cyber and Privacy Law for School Districts: An Overview of the Legal Issues and Risks - February 17th, 10:00 am CT

From remote classrooms to student devices—and everything in between—school districts have been thrown into the deep end with no life jacket when it comes to managing cybersecurity. Join us for a discussion of the unique...more

HaystackID

[Webcast Transcript] Ransomware, Incident Response, and Cyber Discovery: History, Solutions, and AI Workflows

HaystackID on

Editor’s Note: On August 11, 2021, HaystackID shared an educational webcast designed to inform and update cybersecurity, information governance, and eDiscovery professionals on how organizations can prepare, address, and...more

Mitratech Holdings, Inc

Privacy, Pandemics, and Business Change…OH MY!!!

Economic uncertainty, health and safety, work from home, IT security issues, continuity, and operational resiliency…it is like an intricate pattern of dominos falling over....more

Epiq

Creating an Information Governance Structure

Epiq on

A well-crafted information governance framework can properly manage valuable data and minimize risk. But not all data protection programs are created equal. Security measures taken by an organization should protect your...more

A&O Shearman

Privacy and Cybersecurity Checklist When Designing a Family Office

A&O Shearman on

As family office executives set up a family office or review an existing family office, it is important to make sure the privacy and cybersecurity concerns are addressed and the governance and information security...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide