Angle
Data Breaches up 72% From Record High: Cyber Incident Readiness Must be Top of Mind
3 Mins
“Protect your data! Breaches are on the rise!” These warnings seem to be everywhere – and rightfully so. Threat actors are sophisticated and new breach trends are constantly materializing. Awareness is no longer enough. It must be coupled with...
Read MoreFederal Contractors Face Stricter Regulation Over Cyber Incident Response Reporting
2 Mins
Last October, the Federal Acquisition Regulation (FAR) Council proposed two new rules, one of which that will influence cyber incident response practices. The scope is limited as it only applies to federal government contractors, so the reach will...
Read More2023 Data Privacy Roundup in the States: Laws Passing at Record Rate
3 mins
At the beginning of each year, the Epiq Angle looks back at major developments affecting legal and business processes.
Read MoreLooking at Data Breach and Class Action Exposure Through a Single Lens
3 Mins
There has been a spike in data breach class actions this year. According to a study by Law.com Radar, the monthly average of data breach class actions was 44.5 from January through August. This figure is more than double of last year’s 20.6...
Read MoreMoving Information Governance to the Driver’s Seat to Accelerate Cyber Breach Response
3 Mins
Information Governance often takes a back seat to other organizational initiatives. But why is this the case? The list of reasons is long and varied. Not knowing where to start or how to build strategic approaches to governing information are top...
Read MoreBreaking Down the New SEC Cybersecurity Rules
4 Mins
On July 26, the Securities and Exchange Commission (SEC) adopted new cybersecurity rules. Organizations will need to disclose material cyber incidents pursuant to a prescribed timeline and information regarding risk management, strategy, and...
Read MoreDeepfakes Bring Deep Risk
3 Mins
Most people know what a deepfake is but have not put much thought into how it could affect business operations. Deepfakes are videos, pictures, or audio that have been convincingly manipulated to misrepresent a person saying something they never...
Read MoreIt’s Time to Blow the Whistle on Deficient Cyber Reporting Programs
4 Mins
What exactly is cybersecurity whistleblowing? That is a question that all organizations should be asking, but the answer is not a simple one. According to the Merriam-Webster dictionary, a whistleblower is defined as an 'employee who brings...
Read MoreHow Thinking Outside Silos Helps Risk Management and Cyber Threat Response
3 Mins
The term “risk” gets tossed around constantly in the corporate world. But who is responsible for defining and managing risk? This answer is not black and white, as risk type and appetite will look different for every organization. What should be a...
Read MoreElevating Cyber Risk Analysis During M&A Due Diligence
4 Mins
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying transaction purpose...
Read More