Our global pages
Close- Global home
- About us
- Global services/practices
- Industries/sectors
- Our people
- Events/webinars
- News and articles
- Eversheds Sutherland (International) Press Hub
- Eversheds Sutherland (US) Press Hub
- News and articles: choose a location
- Careers
- Careers with Eversheds Sutherland
- Careers: choose a location
BreachLawWATCH App
Eversheds Sutherland is pleased to announce the release of BreachLawWATCH, a unique mobile app that provides easy, consistent access to data breach statutes across a growing number of jurisdictions including Europe, Asia and the United States.
Easy-to-use functionality enables users to find relevant breach notification regulations at their fingertips on a country-by-country basis. More specifically, the app is organised by jurisdiction and includes various categories such as notification requirements, definitions of personal information and breach of security, and timeframes for notification.
The Eversheds Sutherland BreachLawWATCH app is available for free download in the Apple App Store and Google Play.
Responding to a cyber-attack - Scenario-based, cybersecurity “wargame” Interactive workshop and training
Organisations are increasingly vulnerable to Cyber attacks. The progressively permeable barrier between IT systems and operational control systems since the rise of “smart devices” to generate efficiencies and conveniences is only one example of how an organization may be targeted.
What happens if cyber attackers strike at the beginning of a public holiday? What if your Chief Information Security Officer (CISO) is uncontactable on a flight? Would you feel confident you knew what to do?
How can we help?
Our “Wargame” workshop runs through a realistic Cyber attack against a global organization and has been designed to replicate real world stressors.
Our scenario based training covers the roles, best practices, and steps that your organization should take to make sure that a bad day doesn’t become tragic.
Our training has been designed to bring out the complex considerations involved in the rapidly evolving global regulatory environment.
Key features
The scenario will be based on real-world events and will bring out the best and worst practices within similarly situated companies we've already advised.
- It is highly interactive and highly informative
- It is tailored to your organizations sector
- It extends across the cyber continuum from proactive policies to crisis response
- It looks at handling the aftermath (from regulatory action to litigation to even congressional hearings)
We make sure that we highlight the key lessons, including to avoid single points of failure. We use the below methodology to convey this in a concise and targeted way.
- Ten Key Principles
- Key Considerations
- Ten Key Takeaways
Contact us
Paula Barrett, Co-Lead of Global Cybersecurity and Data Privacy
- Co-Lead of Global Cybersecurity and Data Privacy
- +44 207 919 4634
- E-mail Paula Barrett
Michael Bahar, Co-Lead of Global Cybersecurity and Data Privacy
- Co-Lead of Global Cybersecurity and Data Privacy
- +1 202 383 0882
- E-mail Michael Bahar