News & Analysis as of

Forensic Examination Data Protection

Association of Certified E-Discovery...

[Webinar] Digital Forensics in your Incident Response Plan - September 26th, 10:00 am PDT

Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using...more

Troutman Pepper

Does Every Incident Require a Forensic Report? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

Troutman Pepper

Should Companies Conduct Their Own Forensic Investigations? - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

‘Dear Mary,’ is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related – data breaches, forensic investigations, how to...more

EDRM - Electronic Discovery Reference Model

Illumination Zone: Episode 159 | Shawn Belovich of HaystackID sits down with Kaylee & Mary

In the fifteenth episode of EDRM Trusted Partner, HaystackID’s podcast series, Shawn Belovich, Senior Vice President - Digital Forensics & Cyber Incident Response for HaystackID sits down with Kaylee and Mary to talk about...more

Mintz - Privacy & Cybersecurity Viewpoints

Another Court Orders Production of Cybersecurity Firm’s Forensic Report in a Data Breach Case

Another district court just ordered the defendant in a data breach class action to turn over the forensic report it believed was entirely protected from disclosure by the attorney-client privilege and work product doctrine....more

Bradley Arant Boult Cummings LLP

Top 10 Things to Do in the Event of a Data Breach

This webinar focuses on strategies for mitigating reputational, litigation, and regulatory risk in the post-data breach environment. We will offer specific practice tips to implement during this crisis period that are...more

Perkins Coie

Ransomware: How to Avoid It and What to Do If You Have Been Hit

Perkins Coie on

Computer systems around the world have been impacted by the largest cyber-extortion attack in history. According to news reports, the “ransomware” attack hit more than 200,000 victims in 150 countries since it started on...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide