"Canopy gives us the ability to target PII with precision, which is the single most effective way to focus our review team’s efforts and keep costs low."
Kieran Doyle
Head of Cyber, Privacy and Tech Liability | Wotton + Kearney
The Challenge
An Australia-based financial advisory and accounting business suffered a credential compromise, affecting several mailboxes (PSTs) and endangering sensitive financial information. The company’s cyber insurer enlisted Wotton + Kearney’s Cyber Forensics Service for breach response.
The Solution
Seeing a real need to be able to more quickly assess the nature of breaches and help organizations meet non-negotiable notification deadlines, all while managing the cost of cyber claims for insureds and insurance partners, W+K chose Canopy's Data Breach Response software as the right tool for the job.
"When it comes to batching, reviewing spreadsheets, and linking compromised PII to people, other tools simply cannot compare."
Jorge Nicholas
Associate | Wotton + Kearney
The Result
-
Detected 15 categories of PII, including high-risk data like bank account numbers
-
Streamlined document grouping & batching process
-
Transformed PII Review process into an accept/reject workflow, eliminating the need to copy-and-paste data into spreadsheets
-
Imported data from spreadsheets in seconds, taking the pain out of dealing with Excel files
-
Clearly displayed linked PII and people together in the Entity Panel
-
Sped up PII Review by 15%
Unparalleled Processing Power & Speed
76.77 GB
size of compromised PSTs
829,000+
documents in the PSTs
15
categories of PII detected
Request Wotton + Kearney Case Study
See how Canopy's AI & machine learning algorithms sped up their PII Review by 15%.
Request a Demo
See how Canopy's Data Breach Response software leverages machine learning at every step, from PII detection through to generating a notification list.
Get These Results for Your Data Breach Response
Request your personalized demo to see how Canopy's AI-powered solution can transform your workflow.