Canopy Blog: Data Breach Response (2)
Exploring the Evolution of Incident Response on the Elevate. Together. Podcast
What should you do if your company suffers a cyber incident? Which comes first, laws or tech? And how has Data Breach Response evolved over its short lifetime? 🌳🌳🌳Canopy COO..
Canopy Talks PII, Data Breach Response, & Privacy on BarCode Podcast
Canopy COO Adi Elliott recently joined Chris Glanden, host of BarCode podcast, to chat about data breach response, incident response, preventing data loss, the application of AI..
The U.S.’s New Breach Reporting Law & What It Means for Incident Response Teams
On March 15, 2022, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act into law as part of the Consolidated Appropriations Act of 2022, an omnibus..
How AI Is Transforming Data Breach Response & Risk Mitigation Efforts
🌳🌳🌳Canopy recently joined Jodi and Justin Daniels on their podcast, She Said Privacy, He Said Security, to discuss using AI for Data Breach Response.
Canopy Talks Data Privacy, Cybersecurity, & Breach Response with “The Data Diva”
Having journeyed from ediscovery into data breach response, Adi Elliott knows emerging technologies. And as Canopy’s chief revenue officer, he’s also an authority on applying AI..
Square Peg, Round Hole: Why Ediscovery Isn’t a Good Fit for Data Breach Response
“Can I use ediscovery to respond to a data breach?” Technically, the answer is “yes,” — but should you? That’s the real question, and a wrong decision could compromise your..
Consolidating 4 Billion PHI Entities in Hospital Data Breach Response
As PHI breaches including billions of entities become more common, review teams need to adjust how they approach these incidents.
4 Monsters Lurking in Your Data Breach Review
Learn about the 4 monsters that haunt data breach review processes. Contact us to ward them off.
Data Mining for Protected Data with Canopy
Canopy Software recently released a case study highlighting how our data mining innovations decrease the time our customers spend on protected-data discovery and data breach..
9 Differences Between Data Breach and Litigation Reviews
In a cyber incident response, data must be scanned for Personally Identifiable Information (PII) and Protected Health Information (PHI) to determine if a data breach of protected..