Maersk suffered an attack not having a thorough plan over 5,000 data breach incidents Build a Truly Strategic Incident Response Team Inform Response Plans through Threat Profiles Prepare Legal Notifications for Security Incidents e.g. e.g. Test and Revise Plans Connectivity with the Board Conduct Post-Incident Evaluations
  • What caused the security incident and when did the incident occur?
  • What was the impact on the company, its employees, its customers, and its service providers?
  • How well did incident response team members and employees follow procedures?
  • Did the policies and procedures adequately address the incident and conform to all legal requirements?
  • How effectively was information collected and disseminated about the incident?
  • Is the incident indicative of any cyber threat trends that require modification of the policies and procedures?
  • Should contracts with vendors or customers be updated based on the lessons learned?
Key Takeaway

Michael Leiter represents clients in matters involving U.S. national security and cybersecurity, cross-border transactions and government investigations, with a focus on the defense, intelligence and technology sectors. Joe Molosky advises clients in a variety of transactional, regulatory and litigation matters, including cross-border transactions, regulatory proceedings, and privacy and cybersecurity issues. His practice focuses on national security reviews before the Committee on Foreign Investment in the United States (CFIUS), cybersecurity compliance and incident response, data privacy, national security, and consumer protection issues as well as internal and government investigations. Michelle Weinbaum is a CFIUS associate in Skadden's Washington, D.C. office.