Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

Tips on Working With Law Enforcement After a Breach

Attorney Ruth Promislow Offers Do's and Don'ts
Ruth Promislow, partner, Bennett Jones LLP, Toronto

Although it's important to work with law enforcement after a data breach, organizations need to be careful about what information they share, says attorney Ruth Promislow, partner at Bennett Jones LLP.

See Also: Are You APT-Ready? The Role of Breach and Attack Simulation

In a video interview at Information Security Media Group's recent Fraud and Breach Prevention Summit in Chicago, where Promislow was a panelist, she discusses:

  • Why organizations should have an attorney involved when working with law enforcement;
  • The differences in working with in-house attorneys vs. outside legal experts;
  • Creating a breach response strategy.

Promislow practices commercial litigation with a focus on commercial crime, including cybersecurity, investment fraud, employee fraud and anti-money laundering. She has extensive experience with cybersecurity matters, including cyber preparedness, incident response and related litigation. She oversees and conducts internal investigations for clients, working with internal and external auditors.


About the Author

Tracy Kitten

Tracy Kitten

Former Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

Kitten was director of global events content and an executive editor at ISMG. A veteran journalist with more than 20 years of experience, she covered the financial sector for over 10 years. Before joining Information Security Media Group in 2010, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by CNN.com, ABC News, Bankrate.com and MSN Money.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.