Our holistic approach to incident response brings order to the chaos of a cyberattack’s immediate aftermath. In turn, our alternative service delivery model maximizes efficiency and secrecy by reducing the need for third-party involvement.
From the outset, a breach counsel such as Blakes Partner Catherine Beagan Flood coordinates a multidisciplinary team of lawyers based on the unique technological, geographic and legal needs of our clients. This ensures we draw on national talent from the Firm’s Cybersecurity group to guide clients through the crisis.
The breach counsel is also responsible for external advisers involved in the matter. They deploy expert negotiators to handle ransom demands from cyber criminals and integrate input from providers of forensic, public-relation and other services into our legal advice.
Meanwhile, cyber experts within inSource ― our fully integrated in-house alternative service delivery provider — get straight to work on an initial assessment of the compromised dataset. This allows them to swiftly gauge the magnitude and scope of the breach.
The inSource team uses a document-review product with machine learning and advanced analytics capabilities to identify impacted files. Our lawyers are then able to hone in on documents most likely to contain personal information that may create a real risk of significant harm if disclosed, such as social insurance numbers and other government-issued identification.
To facilitate the deeper dive, we built our own solution, allowing users to tag documents containing personal information. Each piece of sensitive data can also be permanently linked to the names of individuals who may need to be notified.