Data mining has increasingly become one of the largest expenses during a cyber incident. Tomorrow’s webcast from HaystackID will discuss data mining in incident response!
Tomorrow, HaystackID will host the webcast Data Mining in Incident Response: Managing Risk and Spend through An Effective Evidence-Based Approach at noon ET (11am CT, 9am PT). This session will highlight the risks of over and under notice of impacted individuals in a cyber incident and will discuss key checkpoints ahead of and throughout the data mining process, while giving claims professionals a new understanding of the types of levers they should be pulling internally at their organizations, and with their partners to optimize, manage, and establish repeatable processes with a special focus on the below underlying themes:
- Whether to provide individual notice under data breach law requires understanding some key facts: whose data is at issue? Where are they (in what jurisdiction)? What data is at issue? How (and to what degree) was the data compromised.
- When unstructured data is compromised, this requires identifying the who, where and what of the data through cyber review. Making assumptions about the data (even informed assumptions based on SMEs) will inevitably lead to over and under inclusive notice. PII and PHI can creep into places (and be missing from others).
- Over notice creates risk as it inflates the scope of the breach unnecessarily damaging the brand and making the incident more attractive for litigation.
- Under notice is worse as it can lead to questions about the sufficiency and completeness of the notice and remediation steps. Attacking the completeness of the notice allows plaintiff counsel to open a new front in their litigation.
Expert Panelists include:
- Mike Sarlo, Chief Innovation Officer, President of Global Investigations and Cyber Incident Response Services, HaystackID
- Susana Medeiros, Associate, Norton Rose Fulbright
- Sam Sessler, Assistant Director, Global eDiscovery Services, Norton Rose Fulbright
- Anya Korolyov, Vice President, Cyber Incident Response and Custom Solutions, HaystackID
A lack of standards amongst breach coaches, claims professionals, and the vendors who consult on and perform data mining work has resulted in an unmanageable situation for insurers, despite there being repeatable, defensible methods to stage, understand, and act on sensitive data utilizing workflows that are established in the scientific method and eDiscovery in general during litigation. Click here to register and learn more about data mining in incident response!
So, what do you think? Do you know the best practices for data mining in incident responses? If not, now’s your chance to learn! Please share any comments you might have or if you’d like to know more about a particular topic.
Disclosure: HaystackID is an Educational Partner and sponsor of eDiscovery Today
Disclaimer: The views represented herein are exclusively the views of the author, and do not necessarily represent the views held by my employer, my partners or my clients. eDiscovery Today is made available solely for educational purposes to provide general information about general eDiscovery principles and not to provide specific legal advice applicable to any particular circumstance. eDiscovery Today should not be used as a substitute for competent legal advice from a lawyer you have retained and who has agreed to represent you.