Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly.

Examples of proactive and reactive guidance:

  • — System data retentions to ensure appropriate sets are available for post breach analysis
  • — Breach response workflow processes that integrate legal and technology resources
  • — Post breach preservation considerations

Click here to view the materials from a webinar we recently hosted, providing practical guidance and workflow suggestions to change potential cacophony into symphony.

Be Sociable, Share!