![]() How long do they last, what are the key steps so people have better context heading into an incident for what they’re about to encounter. So we really dig into what allows incidents to occur, We collect data from the incidents we work on, extract key statistics and use that to build insights to help our clients prepare for incidents ahead of time and give them context and benchmarking during an incident. We help companies before, during and after security incidents. This was our 8th report and our focus is on the roots of how our overall practice grew. How long has it been around and what is its purpose?Ĭraig Hoffman: We call it the DSIR. Nelson: Well, let’s start by having you tell us a little about the BakerHostetler Data Security Incident Response Report. It’s great to have you with us today Craig.Ĭraig Hoffman: Thank you. Distinguished by his wealth of experience in responding to information and data incidents, Craig is especially highly regarded for his representation of payment card providers. A sought-after Digital Risk Advisor who co-leads BakerHostetler’s Digital Risk Advisory and Cybersecurity team. Today, on Digital Detectives, our topic is Revealing Stats from the 8th Annual BakerHostetler Data Security Incident Response Report. Simek: And I’m John Simek, Vice President of Sensei Enterprises. I’m Sharon Nelson, President of Sensei Enterprises, a digital forensics, managed cyber security and managed information technology firm in Fairfax, Virginia. Nelson: Welcome to the 137th Edition of Digital Detectives. We’ll discuss computer forensics, electronic discovery and information security issues and what’s really happening in the trenches not theory but practical information that you can use in your law practice right here on the Legal Talk Network. Special thanks to our sponsors CaseFleet, Clio, Embroker, and PInow. “unreliable” threat actors discuss the enhancement of security through training, training, training and much more.Ĭraig Hoffman is a sought-after digital risk advisor who co-leads the Digital Risk Advisory and Cybersecurity team at law firm BakerHostetler. ![]() They outline the security mishaps that just won’t go away talk about ransomware and companies’ interactions with “reliable” vs. Sharon Nelson and John Simek welcome back Craig Hoffman to unpack the findings of BakerHostetler’s 2022 DSIR Report. Avoiding a data breach should be amongst your top priorities, and understanding threats and causes helps you improve your preventative measures.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |