Canopy Blog: Data Breach Response (3)
Unpacking the Jargon of Data Breach Response
Canopy is the core of a unique process in the ever-growing field of data breach response. A delicate balance of people, process, and technology come together on every project to..
Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response
Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..
How to Make Your Incident Response Plan
At Legalweek New York 2019, Canopy attended the Beyond The Attack – Legal & Ethical Considerations In Breach Response session. The panel educated us about the interplay between..
4 Ways to Reduce Abnormal Churn After a Data Breach
Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to the 2018 Cost of Data Breach Study by IBM and the Ponemon..