Global menu

Our global pages

Close
Print Friendly and PDF

BreachLawWATCH App

Eversheds Sutherland is pleased to announce the release of BreachLawWATCH, a unique mobile app that provides easy, consistent access to data breach statutes across a growing number of jurisdictions including Europe, Asia and the United States.

Easy-to-use functionality enables users to find relevant breach notification regulations at their fingertips on a country-by-country basis. More specifically, the app is organised by jurisdiction and includes various categories such as notification requirements, definitions of personal information and breach of security, and timeframes for notification.

The Eversheds Sutherland BreachLawWATCH app is available for free download in the Apple App Store and Google Play.

Apple app store       Google play

Responding to a cyber-attack - Scenario-based, cybersecurity “wargame” Interactive workshop and training

Organisations are increasingly vulnerable to Cyber attacks. The progressively permeable barrier between IT systems and operational control systems since the rise of “smart devices” to generate efficiencies and conveniences is only one example of how an organization may be targeted.

What happens if cyber attackers strike at the beginning of a public holiday? What if your Chief Information Security Officer (CISO) is uncontactable on a flight? Would you feel confident you knew what to do?

How can we help?

Our “Wargame” workshop runs through a realistic Cyber attack against a global organization and has been designed to replicate real world stressors.

Our scenario based training covers the roles, best practices, and steps that your organization should take to make sure that a bad day doesn’t become tragic.

Our training has been designed to bring out the complex considerations involved in the rapidly evolving global regulatory environment.

Key features

The scenario will be based on real-world events and will bring out the best and worst practices within similarly situated companies we've already advised.

  • It is highly interactive and highly informative
  • It is tailored to your organizations sector
  • It extends across the cyber continuum from proactive policies to crisis response
  • It looks at handling the aftermath (from regulatory action to litigation to even congressional hearings)

We make sure that we highlight the key lessons, including to avoid single points of failure. We use the below methodology to convey this in a concise and targeted way.

  • Ten Key Principles
  • Key Considerations
  • Ten Key Takeaways