Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly.

Examples of proactive and reactive guidance:

  • — System data retentions to ensure appropriate sets are available for post breach analysis
  • — Breach response workflow processes that integrate legal and technology resources
  • — Post breach preservation considerations

Click here to view the materials from a webinar we recently hosted, providing practical guidance and workflow suggestions to change potential cacophony into symphony.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.