pdf

Drinker Biddle was one of the first national law firms to create an integrated information governance practice focused on comprehensively addressing our client’s cybersecurity, incident management, analytics, information management, and e-discovery needs. To accomplish this, we assembled an unrivaled team of the industry’s top lawyers, security consultants, technologists, data scientists, and other professionals widely recognized as leaders in their respective fields.

Our unique approach leverages a truly multidisciplinary team to help our clients not only respond to data breaches and other incidents in a fast, comprehensive, and effective way, but also to prepare their organization in a way that minimizes the chances of such incidents occurring and their impact if and when they occur.

In collaboration with Tritura Information Governance, a wholly owned subsidiary of Drinker Biddle providing specialized analytics services, our practice has helped many of the world’s leading institutions prepare for and respond to security and other organizational risk incidents through a broad range of services that include vulnerability assessments, policy development, incident response plan implementation, internal investigations, negotiating Consent Decrees, and data breach response planning and execution.

In addition, we counsel clients on data breach notification efforts to affected persons and relevant law enforcement authorities, defend clients in class actions and other enforcement proceedings and develop settlement programs involving thousands of claimants, and engage with cyber-liability insurers as needed to implement remediation plans that protect clients from future breaches.

Through our involvement in the quantitative research and other community activities at the Information Governance Initiative, as well as our direct engagement with hundreds of organizations, we have a broad purview of the scope and scale of information security, privacy, and other IG challenges at organizations large and small, across multiple verticals.

Representatives Incident Response Engagements

Incident Response: Detailed Engagement Profiles

Type Ransomware Attack Network Intrusion Incident Recovery
Industry  Professional Services  Technology Services Healthcare
Org. Size  <1,000 1,000-5,000  >5,000
Geography  US US/EMEA US
Snapshot Advised and assisted professional services firm in recovering from ransomware attack with minimal business interruption. Served as breach coach for complex network intrusion with concomitant targets ransomware attack. Advised client with respect to notification obligations and assisted with root cause analysis and recovery. Advised large health system client on incident response and recovery with respect to crippling ransomware attack.
Related Services Investigate data incidents and breaches in conjunction with forensic experts where necessary and oversee the implementation of appropriate remedial measures. Assist clients in preventing data breaches via vulnerability assessment management, transactional counseling, CISA information sharing, and security policies. Information Governance Framework design and implementation
Provide real-time breach/ransomware response and support with execution of incident response plan. Counsel clients in connection with data incidents and breaches regarding the implementation of contingency plans and notification efforts to affected persons and relevant law enforcement authorities. Information Inventory—work with IT to understand all ways information is created and maintained
Provide real-time breach/ransomware response and support with execution of incident response plan. Counsel clients in connection with data incidents and breaches regarding the implementation of contingency plans and notification efforts to affected persons and relevant law enforcement authorities. Information Inventory—work with IT to understand all ways information is created and maintained
Defend companies in class actions and other enforcement proceedings and develop settlement programs involving thousands of claimants. Litigation support

Develop procedures and response plans to guide the implementation of IT security and use policies

Additional Examples

  • PCI-DSS. Managed all aspects of breach response and forensic analytics for large (>3MM accounts) PCI-DSS breach, including extensive coordination with federal law enforcement.
  • HIPAA. Provided notification advice and breach analytics for large suspected HIPAA bretach.
  • Breach Notification. Analyzed large corpus (>100 GB) of email to efficiently determine PII and extract individuals’ names and addresses for notification.
  • Data Breach Contract Terms. Advised clients on data breach terms and conditions for commercial contracts.
  • Massachusetts Privacy Law Compliance. Advised client on compliance with Massachusetts Privacy Law and provided the mandatory WISP (Written Information Security Program).
  • NYDFS Cybersecurity Regulation Compliance. Advised multiple clients on breach response in compliance with New York Department of Financial Services Cybersecurity Regulation.
  • Phishing and Data Theft. Managed full lifecycle of an large-scale phishing incident that resulted in the international theft of extensive employee HR data, coordinating extensively with federal law enforcement.

 

Cybersecurity Services

Our Information Privacy, Security and Governance (IPSG) team brings together leaders across multiple areas of the firm and is equipped to assist clients with assessing information privacy and security practices, developing information governance programs, responding to regulatory requests, coordinating with law enforcement, and developing and managing incident response protocols, including breach notification and coordination with law enforcement.

Incident Response Services

  • Incident Response Management. Operating and coordinating a comprehensive, real-time approach to incident management for organizations experiencing a breach, theft, ransomware attack or other cybersecurity incident.
  • Incident Assessment. Evaluating the risks to the organization, data subjects, and third parties from incidents involving the loss, theft, or unauthorized access, use, or disclosure of data assets, and develop a concomitant strategy and tactical plan.
  • Incident Communication Planning and Execution. Managing communications with law enforcement, regulatory authorities and data subjects in accordance with legal requirements and organization’s policies. Work with client’s public relations team to respond to media inquiries.
  • Investigations & Litigation. Defending organizations in government investigations and prosecutions, as well as in individual and class actions related to cybersecurity incidents.
  • Analytics-Enabled Incident Response. Applying sophisticated data analytics to aid in incident response, cybersecurity remediation, internal investigations, due diligence, data loss prevention, and other aspects of cybersecurity and information governance.

Cyber Preparedness Services

  • Cybersecurity Compliance Assessment. Evaluating an organization’s overall compliance (or a particular data processing activity or technology) with specific laws, regulations, and standards.
  • Data Asset Mapping, Remediation, and Protocol Development. Creating a comprehensive view of an organization’s data environment as foundation for a practical, risk-adjusted approach to managing, remediating, and protecting data assets.
  • Benchmarking and Maturity Assessments. Evaluating the relative maturity of an organization’s cybersecurity program, and/or benchmark against the maturity of similar organizations.
  • Vulnerability Testing. Working closely with our technical partners, test and evaluate security controls.
  • Cybersecurity Training. Train employees, executive management, and boards on general cybersecurity best practices, as well develop and deliver organization-specific awareness and compliance training.
  • Tabletop Exercises. Leading an organization through simulated incidents to reveal and identify actions that should be taken and clarify organizational roles and responsibilities.