CALL ON A BREACH COACH IN THE EVENT OF A CYBERSECURITY INCIDENT

WHAT IS A BREACH COACH?

Breach coaches are often lawyers who specialize in data protection and cybersecurity law and are therefore well placed to provide strategic advice to their clients, while being subject to the confidentiality provided by attorney-client privilege. Breach coaches maintain relationships with forensic investigators, crisis communications professionals and other services an organization may need following a cyber attack, so that services can be mobilized quickly and discreetly.

HOW CAN A BREACH COACH HELP YOU?

When a cybersecurity incident occurs, it’s essential to act quickly: the sooner the threat is identified and contained, the less likely it is to wreak havoc. Our team is available 24/7 to provide strategic advice on immediate actions to be taken, and will coordinate the efforts of a team of first responders to mitigate and stop any attack in progress, and advise on negotiating with ransom-seeking perpetrators, if necessary.

In the days following a cyber attack, a breach coach will advise you on the appropriate way to inform customers and employees of the incident, if the situation warrants. Our team can prepare and issue the notifications required by the various regulatory bodies if sensitive data justifying such disclosure has been obtained by the authors. A breach coach will continue to work with a team of forensic experts and provide strategic advice on determining the extent of the infiltration. They will oversee system restoration strategies and the implementation of credit monitoring services, and work with your insurance company where appropriate.

YOUR TEAM

MARY DELLI QUADRI

Lawyer, Partner

ALEXANDRA KALLOS

Senior lawyer

THESE PUBLICATIONS MAY BE OF INTEREST TO YOU

“I would never fall for a scam! I’m smarter than that, it could never happen to me!”   As a professional specializing in cybersecurity and privacy law, I...

To kick off our educational series, we dive into an explanation of a crucial industry term, “Zero-Day Exploit”. In the increasingly sophisticated field of cyberthreats, the threat of...

Introduction Artificial intelligence (AI) has been a revolutionary technology in recent years, changing the way the world works. AI has the ability to automate tasks, analyze large amounts...