Select Page

Cyber GC

Key Steps To Protecting Privilege – Business

Executive Summary

Cybersecurity and Protecting Privilege. Time sensitive. Can’t be done after the fact.
You either get this right up front, or your investigation response report is available for discovery in any litigation that might follow a breach.

Make sure you have included your legal counsel at the top of your organisation’s IR call list. Read our guide to protecting privilege when you have a security breach.