Our cybersecurity and incident response team takes an interconnected approach to managing cyber risk that integrates preparedness, resilience, and remediation. We help clients develop comprehensive security programs to proactively protect critical assets and prevent incidents. When breaches do occur, our team has deep experience leading swift and thorough incident response from investigation to recovery. Our team provides emergency response services in the immediate aftermath of a data breach and counsels clients through all phases of a data incident on a 24/7 basis. We have established relationships with forensic investigators, consumer notification companies, call centers, and public relations firms, all of whom we have called upon to provide support in the earliest phases of incident response.

Our services include:

  • Risk assessments: Evaluating infrastructure, applications, and data flows to identify vulnerabilities.
  • Compliance gap analysis: Assessing against regulations and frameworks like HIPAA, PCI DSS, and NIST.
  • Incident response planning: Developing incident response plans and data breach notification procedures.
  • Tabletop exercises: Conducting simulation exercises to test response capabilities.
  • Policies and controls: Establishing information security policies and technical controls.
  • Staff training: Developing and delivering cybersecurity awareness training.
  • Vendor risk management: Assessing third-party cyber risk and security capabilities.
Incident Response
  • Coaching: Working closely with internal and external stakeholders to form an immediate response.
  • Investigation: Identifying and coordinating an investigation to contain, analyze, and determine root cause of suspected breaches.
  • Notifications: Assessing notification obligations and notifying individuals, regulators, and vendors in compliance with breach laws.
  • Litigation defense: Defending against resulting regulatory actions, lawsuits, and enforcement.
  • PR management: Crafting communications to media, customers, and stakeholders.
Post-Incident Services
  • Remediation: Developing plans and implementing fixes to close security gaps revealed by breach.
  • Compliance audits: Assessing updated controls and revising compliance programs per findings.
  • Security upgrades: Enhancing security measures with the latest technology and practices.
  • Claims management: Administering claims process and claims payments to affected individuals.
  • Ongoing support: Providing guidance on lessons learned and optimizing future preparedness


Jump to Page

Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.

Analytical Cookies

Analytical cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.