 |
APWG – Phishing Activity Trends Report (APWG, September 2022) |
 |
Data Visualization: World’s Biggest Data Breaches & Hacks (Information is Beautiful, September 2022) |
 |
Exploring Organisational Experiences of Cyber Security Breaches (U.K. Department for Digital, Culture, Media and Sport, August 2022) |
 |
Encrypted messaging service hacked as result of cloud communications company breach (IAPP, August 2022) |
 |
Privacy with Microsoft Video Series – Episode 3: Privacy Incident Management Program Development (Microsoft, August 2022) |
 |
ICO Data security incident trends (ICO, August 2022) |
 |
Verizon Data Breach Investigations Reports (Verizon) |
 |
Hiscox Cyber Readiness Report (Hiscox, August 2022) |
 |
Experian Data Breach Industry Forecast (Experian, August 2022) |
 |
Report: Average data breach costs $4.4M (IAPP, July 2022) |
 |
FTC signals expanded breach notice obligations (IAPP, June 2022) |
 |
Ransomware attacks lead to national emergency in Costa Rica (IAPP, May 2022) |
 |
Measures that Educational Institutions Should Take to Prepare for Ransomware Attacks (BakerHostetler, April 2022) |
 |
Report: Ransomware gangs may have resources to hire AI experts (IAPP, April 2022) |
 |
Millions at risk of data breach through Log4j flaw (IAPP, December 2021) |
 |
EDPB adopts breach notification guidance (IAPP, November 2021) |
 |
As data breaches near ‘all time high,’ Senate committee talks regulation (IAPP, October 2021) |
 |
Ransomware, data protection and compliance (IAPP, August 2021) |
 |
Singapore’s PDPA: What to Know For Incident Response (BreachRx, August 2021) |
 |
Report: 94% of organizations experienced insider data breach in past year (IAPP, July 2021) |
 |
Chronicling two years of NHS data breaches (IAPP, July 2021) |
 |
What the world of sports teaches us about incident preparedness and response (IAPP, June 2021) |
 |
Kroll: 2021 Data Breach Outlook (Kroll, June 2021) |
 |
Handbook on How to Guard Against Common Types of Data Breaches (PDPC, May 2021) |
 |
EPDS Infographic — Personal Data Breaches in a Nutshell (EPDS, May 2021) |
 |
Data Masking in the Enterprise (Tsaaro and Cloud Compliance, April 2021) |
 |
Web Conference: Cyber Risk, Breaches and Security in 2021 (IAPP, January 2021) |
 |
DLA Piper GDPR Data Breach Survey 2021 (DLA Piper, January 2021) |
 |
When Should Law Firms Notify Clients About Data Breaches? (Business Law Today, November 2020) |
 |
Web Conference: Breaching the Company through the C-Suite (IAPP, September 2020) |
 |
Web Conference: Top 6 Reasons Why the Consumer Response to a Data Breach Will Fail (IAPP, August 2020) |
 |
Your privacy practices predict your data-breach future (IAPP, August 2020) |
 |
Heightened cyber and corporate crime risks in the COVID-19 pandemic (Norton Rose Fulbright, July 2020) |
 |
Study: 92% of firms feel data breach vulnerability (IAPP, April 2020) |
 |
Web Conference: The Privacy Incident Benchmark Report: Data to Drive Operational Excellence (IAPP, March 2020) |
 |
The Osano Data Privacy and Data Breach Link (IAPP, April 2020) |
 |
How to evaluate your privacy-incident response program (IAPP, October 2019) |
 |
Online Trust Alliance: Cyber Incident and Breach Trends Report (Online Trust Alliance, July 2019) |
 |
Managing data breaches in the cloud (IAPP, January 2020) |
 |
How to use 2020 to improve your incident response (IAPP, January 2020) |
 |
What should organizations consider when notifying consumers of a data breach? (Bryan Cave Leighton Paisner, January 2020) |
 |
A Consumer’s Checklist for Handling Identity Theft (Commonwealth of Massachusetts, June 2019) |
 |
How to accelerate breach-notification timeframes (IAPP, May 2019) |
 |
How to operate under Canada’s new breach notification landscape (IAPP, May 2019) |
 |
Bryan Cave Data Breach Litigation Report (Bryan Cave, May 2019) |
 |
How long should it take to risk-score a privacy incident? (IAPP, August 2019) |
 |
Web Conference: To Notify or Not to Notify? That Is the Question. (IAPP, August 2019) |
 |
Complying with Breach Notification Obligations in a Global Setting: A Legal Perspective (Global Investigations Review, July 2019) |
 |
Seeking Solutions: Aligning Data Breach Notification Rules Across Borders (U.S. Chamber of Commerce and Hunton Andrews Kurth, April 2019) |
 |
How often do notification exceptions apply? We look to the data (IAPP, February 2019) |
 |
Data breach insurance: A three-part problem (IAPP, January 2019) |
 |
Web Conference: Changing Global Data Breach Notification Laws (IAPP, November 2018) |
 |
Benchmarking for GDPR: How often are orgs reporting data breaches to authorities and subjects? (IAPP, March 2019) |
 |
72 hours and counting: Do’s and don’ts of incident response (IAPP, February 2019) |
 |
White Paper – Some Privacy Practices May Result in Under-Reporting of Breach Incidents (IAPP, May 2018) |
 |
How startups can beat breaches on a budget (IAPP, September 2016) |
 |
The misconceptions of data breach fatigue (IAPP, February 2016) |
 |
Top five company fails in prepping for a breach (IAPP, August 2016) |
 |
2016 Data Protection & Breach Readiness Guide (Online Trust Alliance, February 2016) |
 |
2017 Data Breach Litigation Report (Identity Theft Resource Center, 2017) |
 |
Web Conference: Canada’s Data Breach Notification Law Update (IAPP, December 2018) |
 |
What To Do When Faced With a Privacy Breach: Guidelines for the Health Sector (Information and Privacy Commissioner of Ontario, October 2018) |
 |
Data security requirements in multistate breach settlements (IAPP, October 2017) |
 |
Reporting a Privacy Breach to the Commissioner: Guidelines for the Health Sector (IAPP, October 2017) |
 |
Quick-Response Cyberattack Checklist (U.S. HHS Office for Civil Rights, August 2017) |
 |
Benchmarking your Privacy Incident Management Program – Article Series (IAPP, July 2017) |
 |
How to Shop Smart for Cyberinsurance – Article Series (IAPP, May 2017) |
 |
Incident Response – Article Series (IAPP, March 2017) |
 |
Get ready to practice breach response in the EU (IAPP, November 2016) |
 |
From devastation to salvation: How to benefit from a breach (IAPP, July 2016) |
 |
Ponemon Annual Benchmark Study on Privacy & Security of Healthcare Data (Ponemon Institute, May 2016) |
 |
2016 Data Security Incident Response Report (BakerHostetler, 2016) |
 |
My company has had a breach: Whom do I have to notify? (IAPP, March 2016) |
 |
Planning for and Responding to a Health Information Data Breach (IAPP, August 2014) |
 |
Identity Theft: Complying with the Red Flags Rule (ABA Bank Compliance, January 2014) |
 |
Best Practices for a Healthcare Data Breach: What You Don’t Know Will Cost You (Experian, April 2013) |
 |
Not All Breaches Are Created Equal Whitepaper (AllClear ID, January 2013) |
 |
Ten steps every organization should take to address global data security breach notification requirements (IAPP, September 2011) |
 |
Do I need to report this breach? (IAPP, August 2017) |
 |
White Paper — Managing Your Data Breach (IAPP, October 2014) |
 |
What If You Had An Employee Data Breach? (IAPP, August 2015) |