From the moment a company learns about a potential breach, it should begin deploying tools to respond quickly and effectively while ensuring that its investigation is privileged. DLA Piper has developed an investigation protocol focused on putting in place those critical protections so they are ready from moment one.
DLA Piper's Cybersecurity group conducted a webinar on managing cybersecurity investigations and DLA Piper's recent experience in this fast-moving area.
- Establishing privilege for forensic investigators/security assessments
- Lessons learned from data breach/hacking incidents and litigation in the past year (standard of care and standing)
- Choosing a forensic vendor/partner
- Trends in the EU
Tara Swaminatha, DLA Piper, Washington, DC
Sam Millar, DLA Piper, London