News & Analysis as of

Data Mining Data Breach

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Jackson Lewis P.C.

Downstream Breaches Cause Headaches for Healthcare Providers, as State AG Seeks Law Change to Require AG Notification

Jackson Lewis P.C. on

For healthcare providers and health systems covered by the privacy and security regulations under the Health Insurance Portability and Accountability Act (HIPAA), a breach of unsecured protected health information (PHI)...more

Association of Certified E-Discovery...

[Webinar] Data Mining 2.0: How WatchtowerAI Transforms Incident Response - December 6th, 1:00 pm - 2:00 pm EST

In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more

HaystackID

[Webcast Transcript] Data Mining in Incident Response: Managing Risk and Spend through an Effective Evidence-Based Approach

HaystackID on

Editor’s Note: On August 31, 2022, HaystackID shared an educational webcast on the topic of data mining in data breach incident response. As data mining has increasingly become one of the largest expenses during a cyber...more

HaystackID

[Webinar] Data Mining in Incident Response: Managing Risk and Spend through An Effective Evidence-Based Approach - August 31st,...

HaystackID on

Data mining has increasingly become one of the largest expenses during a cyber incident, often leaving claims professionals with blown budgets and insured clients in high-risk scenarios when assumptions about their data (and...more

Epiq

Considerations to Streamline Cyber Incident Response Reviews

Epiq on

Dealing with a cyber incident is an incredibly stressful time for clients and counsel. Not only is there the stress of dealing with the initial breach, but also the pressure to do a review of what data was compromised in...more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

GM’s Monday announcement about cutting 14,000 North American jobs drew the ire of the White House yesterday, which threatened to “end federal tax credits” that have helped subsidize the company’s electric-vehicle fleet....more

Robins Kaplan LLP

Your Daily Dose of Financial News

Robins Kaplan LLP on

Some reaction to the HQ2 x2 news, including what a pair of new tech hubs actually means for the cities that have thrown out the red carpet to Amazon and other technology giants....more

Snell & Wilmer

Has Your Computer Been Hijacked For Illicit Cryptocurrency Mining?

Snell & Wilmer on

Another day, and another form of hacking comes to light. On June 26, 2018, the United States Computer Emergency Readiness Team (US-CERT), an agency within the U.S. Department of Homeland Security, issued a security tip...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Hacking Your Vote From Inside Your Head: How Cambridge Analytica Altered Reality Via Social Media To Induce Specific Voting...

We learned some important lessons this week about the dangers inherent to losing control of your customer or client data, either through hacking, internal theft, or poorly designed controls over what your business associates...more

Orrick, Herrington & Sutcliffe LLP

A New Chapter in the Cybersecurity? Is there a Role for Active Deterrence?

In the 1969 film Butch Cassidy and the Sundance Kid, after Butch and Sundance rob Union Pacific Railroad (“Union Pacific”) the first time, Union Pacific employs a stronger safe. After Butch and Sundance rob Union Pacific a...more

FordHarrison

Employment is short. Don’t have an affair

FordHarrison on

Imagine a guy, a married guy, more specifically an unhappily married guy, and even more specifically an unhappily married guy lacking a moral compass. The guy creates a discrete (ha!) profile on AshleyMadison.com, a dating...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide