Challenges In Conducting Breach Investigations: Part 4

Law360, New York (September 30, 2013, 10:03 AM ET) -- This article is the last in a four-part series describing some of the challenges to conducting breach investigations in response to increasingly sophisticated attacks. In Part 1 (published with Law360 on March 26, 2013), we provided an overview of the evolving advanced cyber threat landscape and the three common breach response scenarios (internal investigations to fix technical problems, investigation to assess payment card exposure, and investigations to determine compliance with state data breach notification statutes).

In Part 2 (published with Law360 on April 19, 2013), we...
To view the full article, take a free trial now.
Try Law360 for free for seven days
Already a subscriber? Click here to login

Already have access?

  1. Forgot your password?
  2. Sign In

Get instant access to the one-stop news source for business lawyers