Cyberattack & Data Breach Response
Cyberattacks and data breaches are now common across all major business sectors. The theft, loss or unauthorized disclosure of personal information or other sensitive data can lead to revenue loss, reputation damage, fines, regulatory enforcement action, litigation and legal fees.
The average cost for each lost or stolen record containing sensitive and confidential information is over $100 million. A variety of factors contribute to data breaches, including human error or accident, illegal or malicious activity by individuals, and organized crime or other criminal enterprises.
We can help you prepare for and respond to a cyberattack or the unauthorized disclosure of personal information or other sensitive data. We will work with your in-house lawyers, privacy and compliance officials, and technology teams. In addition, we will work with your other, external service providers and agents, including your information security and digital forensic consultants, cyber insurance carriers, and ransomware negotiators. We regularly lead and direct investigations into data security incidents, manage data breach response teams, and coordinate a single response process, all while working to ensure these activities are properly protected by applicable legal and evidentiary privileges. We have handled data incidents involving all 50 states, the U.S. territories, the European Union, and in several jurisdictions around the world.
Our services include advising on:
- Developing data breach response plans and policies
- Domestic and foreign data breach notification requirements
- Retaining third party cybersecurity forensic and consulting firms
- Negotiating ransomware payments
- Responding to regulatory or third party requests for information, audits, or subpoenas
- Liaison to consumer protection and credit agencies
- Establishing call centers and breach response hotlines
- Internal investigations
- Establishing credit monitoring services
- Assisting a provider of advertising and marketing services to major energy providers in responding to and mitigating a cyber breach that resulted in large fraudulent payments, including protecting sensitive information from further exploitation and the recovery of all fraudulent payments.
- Assisting consumer goods company investigate and respond to data breach arising from unauthorized access to and exfiltration of customer data from the company’s third-party e-commerce platform due to compromise of an employee’s account credentials.
- Assisting global manufacturing company in responding to ransomware attack that compromised sensitive employee and customer data, partnering with European Union counsel to facilitate notifications to supervisory authorities pursuant to the European Union (EU) General Data Protection Regulation and EU Member State law.
- Advising private sector company with respect to an incident involving the unauthorized disclosure of sensitive employee data, counseling on the “good faith” exception within certain U.S. state data breach notification laws and on complying with internal investigation and records retention requirements.
- Counseling health care business associate regarding technical anomaly within its online patient portal that resulted in unauthorized disclosure of medical records and protected health information and drafting formal data breach notification communications and reports.
- Assisting operator of SaaS platform technology service provider serving secondary and post-secondary educational institutions in responding to intrusion into operating systems potentially exposing personal and competitively sensitive information.
- Assisting global manufacturing company with response to the inadvertent disclosure of export-controlled data to foreign nationals, and drafting, preparing and submitting voluntary disclosures to federal department arising from the same.
- Representing defense contractor in joint investigation by the Department of Defense and Federal Bureau of Investigation arising from Maze ransomware attack that potentially exposed controlled unclassified information, which resulted in the closure of the federal investigation without adverse action to client.
- Assisting supply chain defense contractor with response to ransomware attack that compromised the confidentiality of sensitive employee data and controlled unclassified information, including drafting and submitting formal data breach notices to impacted individuals and government agencies.
- Counseling services industry business regarding Office 365 intrusion that resulted in malicious actor disseminating fraudulent invoices to customers from spoofed internet domain.
- Assisting employee health plan in investigating and responding to data breach that occurred within business associate’s information technology environment that resulted in unauthorized access to employees’ protected health information.
- Providing counsel to health care consulting firm on responding to and remediating intrusion arising from a spoofing attack that exposed sensitive customer and patient information.
- Assisting global manufacturer, wholesaler, and retailer of OEM and aftermarket automotive and truck components in responding to and remediating service provider data breaches.
- Representing publicly traded lighting manufacturer in data breach associated with accounts payable fraud scheme.
- Assisting pre-commercial pharmaceutical business in investigating and remediating Office 365 intrusion that potentially exposed employee and clinical data.
- Assisting multiple group health plans in reviewing, analyzing and assessing potential HIPAA breaches by their business associates, including undertaking risk analyses and advising on documentation requirements.
- Assisting clinical laboratory in responding to a significant data breach by its business associate that compromised the health information of many of its patients.
- Assisting hospitals in investigating and responding to a HIPAA data breaches, including an investigation by the Department of Health and Human Services Office for Civil Rights.
- Assisting investment advisory firm in investigating and remediating system intrusion that resulted in the exposure and exfiltration of highly sensitive personal and financial information of high net worth individuals without adverse claims or litigation.
- Assisting non-bank financial service provider in responding to and remediating Office 365 intrusion that exposed sensitive financial and other personal information and that resulted in fraudulent government benefit claims.
- Assisting faith-based nonprofit organization in investigating and remediating Office 365 intrusion resulting from a phishing attack, including forensic review of incident and affected data, breach notifications and agency filings.
- Assisting leading automotive aftermarket parts and service mass retailer in responding to and remediating Office 365 intrusion that compromised employee and customer personal information, including management of breach notifications and regulatory filings.
- Providing assistance to distributor of automotive aftermarket parts in recovering from and remediating ransomware intrusion without payment of ransom.
- Assisting global manufacturing company with resolution and response to ransomware attack that compromised employee HR data (e.g., 401K, benefits plan), including drafting breach notification letter to clients and assisting with development of post-breach written information security plan.
- Preparing data incident response plans and programs and assisting global companies in responding to serious data incidents, including ransomware attacks, impacting operations in both domestic and foreign jurisdictions.
- Working with mid-size insurance company with locations on the east coast and in the south that focuses on homeowners and property insurance, including assessing their data privacy program against industry and standards and best practices and providing recommendations and deliverables on how to resolve cyber vulnerabilities.
- Engaging with client’s cyber insurance carrier to address claims related to ransomware and other cyberattacks.
Businesses must protect the privacy and security of the personal data and confidential information in their custody and control. However, in today’s dynamic threat environment, businesses are facing evolving risks to their information technology (IT) systems and networks. To mitigate these risks, a business should build a data protection program tailored to its unique concerns and threats. Central to developing a data protection program is creating, implementing, and maintaining a clear and concise data incident response plan (IRP) that outlines the measures and tools needed to prepare for and respond to an actual or reasonably suspected data breach. This checklist provides an outline of the critical elements a business should address or consider when creating an IRP.
This checklist provides an outline of the critical elements a business should address or consider when creating an IRP. Full access to the checklist is available here (pdf).
- Governance and responsibilities. The IRP must identify the key individuals who have roles in the security incident response process.
- Incident Response Coordinator. The business should delegate authority to one person, an Incident Response Coordinator, to oversee data breach response efforts.
- Incident Response Team (IRT). An IRT is a predetermined group of employees, contractors, and other resources responsible for responding to data security incidents.
- Incident response procedures. The IRP should include procedures and protocols that address detection and discovery; assessment and escalation; IRT investigation and analysis; and containment, remediation, and recovery.
- Evidence preservation. The IRT should direct appropriate internal or external resources to capture and preserve evidence during the investigation, analysis, and response activities.
- Communications and notifications. The IRT, in coordination and consultation with legal counsel, should consider developing a communication plan for both internal and external stakeholders.
- Post-incident response. Following a security incident or data breach, a business should, at least periodically, reconvene the IRT to assess the incident, the effectiveness of the response, and any remedial measures needed to mitigate risk.
The First 72 Hours:
Critical Steps Following a Data Breach
When it comes to a data breach, what you do in the first few hours and days can mean the difference between containing the risks and losses and losing control of events. As the minutes and hours tick by, the financial and reputational consequences you face may be quickly multiplying. According to the 2019 Cost of a Data Breach Report (Ponemon Institute/IBM Security), the average total cost of a data breach globally is $3.92 million (USD), and in the United States that number more than doubles to $8.19 million. And that doesn’t even begin to account for the potential harm to your public image. It is in the best interests of your company and its employees and customers that you quickly assess the situation, notify the proper parties, and begin the investigation and remediation process. In fact, if you conduct business in the European Union, its General Data Protection Regulation in most cases requires you to report a breach to the supervisory authority within 72 hours of its discovery.
Would you know where to begin? The good news is that you don’t have to. Our Privacy & Cybersecurity team has the experience and resources to help you quickly and effectively respond to a data breach. Our professionals have substantial experience in managing data incident response scenarios, and we can deliver an efficient, disciplined and effective response plan. And we provide our services for a fixed fee, so you know the cost up front.
Here’s how we can help:
- Create and convene (with general counsel/CISO) the incident response team
- Identify and interview knowledgeable personnel
- Investigate source, scope and nature of incident, including what was lost
(physical or data) and if breach was result of third-party service provider failure
- Investigate if data is accessible/usable (e.g., encrypted)
- Identify/counsel/verify initial remediation actions taken to immediately limit damage of incident and stop breach
- Analyze compromised data and determine type(s): PII, PHI, PCI; employee or
- Assess number and geographic distribution of potentially
- Identify and assess short-term reporting and regulatory
obligations (e.g., HIPAA breach)
- Counsel on timing of scope of notices
- Ensure necessary third-party providers are in place
- Counsel on preservation of evidence (e.g., capturing logs
that would ordinarily be deleted)
DELIVERABLE #1: Initial assessment of potential reporting/notification requirements (legal analysis)
Third-Party Provider Assessment
- Identify third-party service providers
- Identify relevant insurance coverage
- Review with internal risk management personnel
relevant insurance contracts/coverage
- Ensure appropriate insurance providers are involved
- Review relevant services/IT agreements and breach
provisions; provide initial advice on next steps/remedies
DELIVERABLE #2: Ensure necessary third-party providers are in place
DELIVERABLE #3: Prepare forms or provide notice templates specific to location/jurisdiction/regulatory requirements
Identification of External Resources/Service Providers
- Initiate retention of notice fulfillment services provider as appropriate
- Retain forensic resources as necessary
- Retain crisis communications consultant/coordinate with company PR and investor relations teams
If your organization has suffered a data breach or incident, please contact us at any time (24/7) here and a Thompson Hine cybersecurity attorney will respond to you as soon as possible.
For more information about the critical steps following a data breach, please contact:
Thomas F. Zych, Partner, Chair, Privacy & Cybersecurity
Steven G. Stransky*, Partner, Vice Chair, Privacy & Cybersecurity
202.263.4126 | 216.566.5646
*International Association of Privacy Professionals, Certified Information Privacy Professional/Government (CIPP/G), Certified Information Privacy Professional/United States (CIPP/US)