Cyber GC
Key Steps To Protecting Privilege – Business
Executive Summary
Cybersecurity and Protecting Privilege. Time sensitive. Can’t be done after the fact.
You either get this right up front, or your investigation response report is available for discovery in any litigation that might follow a breach.
Make sure you have included your legal counsel at the top of your organisation’s IR call list. Read our guide to protecting privilege when you have a security breach.