fbpx
  • LinkedIn
  • 514 879-5606
  • The bloG
  • Careers
  • The Firm
  • Contact
  • Français
Gascon ≡ Menu
  • FIELDS OF EXPERTISE
    • REAL ESTATE LAW
      • Real Estate Acquisition and Sale
      • Commercial Lease
      • Construction
      • Co-Owner
      • Title Review
      • Real Estate Finance
      • Contractors license
      • Due Diligence
      • REAL ESTATE SHAREHOLDING AND PARTNERSHIPS
    • BUSINESS LAW
      • Shareholding and Partnerships
      • Incorporation and Dissolution of Corporations
      • Agreements, Contracts and Partnerships
      • Corporate Financings
      • Merger and Acquisition
      • Corporate Governance
      • Corporate Reorganization
    • LITIGATION AND INSURANCE
      • Collection
      • Arbitration and Mediation
      • Bankruptcy, Insolvency and Restructuring
      • Construction Litigation
      • Commercial Lease Litigation
      • Conflicts between Shareholders
      • Insurance
      • Recourse in Co-ownership
      • Civil Liability Remedies, Hidden Defects and Insurance Recourse
      • Hypothecary Recourse
      • Appeal and judicial review
    • INTELLECTUAL PROPERTY / IT
      • Trademarks
      • Confidentiality Agreements
      • Service Agreements
      • Master Services Agreement (MSA) and Irrevocable Right of Use (IRU)
      • Easements for Telecommunication Services
      • Data Center Agreements
      • Software Source Code Escrow Agreements
      • License Agreements
      • Terms of Use of a Website
    • CYBERSECURITY
      • Incident response planning
      • Breach coaching
      • Loss and liability mitigation
      • Who is at risk?
    • DATA CENTERS
      • Land acquisition and planning
      • Construction and development
      • Operations
  • The Team
  • STARTUP G PROGRAM
  • Search
  • Menu Menu

Calling on a breach coach in the event of an active cyber security incident

What is a breach coach?

Breach coaches are most commonly lawyers who specialize in data privacy law and cyber security and are therefore well positioned to provide strategic advice to their clients, under the confidentiality provided by client-solicitor privilege. Breach coaches maintain relationships with third-party forensics investigators, crisis communications professionals and other services an organization may need in the wake of a cyber event so that services can be mobilized quickly and discreetly.

How can a breach coach help you?

When a cyber security incident occurs, time is of the essence: the faster the threat is identified and contained, the less potential it has to wreak havoc. Our team is available 24 hours a day, 7 days a week to provide strategic advice regarding the immediate actions to take and will coordinate the efforts of a first response team to mitigate and halt any ongoing attack and provide advice on negotiation with perpetrators in search of ransom if need be.

In the days following a cyber attack, a breach coach will advise you on how to appropriately notify clients and employees of incidents if the situation warrants it. Our team can prepare and file the notifications required by various regulatory authorities if any sensitive data warranting disclosure has been obtained by the perpetrators. Our breach coach will continue to work with a team of forensic experts and provide strategic advice with respect to determining the scope of the infiltration and oversee system recovery strategies, the implementation of credit monitoring services and work hand in hand with your insurance carrier, if appropriate.

YOUR TEAM

MARY DELLI QUADRI
https://www.gascon.ca/en/mary-delli-quadri/

MARY DELLI QUADRI

Attorney, Partner
Gascon
ALEXANDRA KALLOS
https://www.gascon.ca/en/alexandra-kallos/

ALEXANDRA KALLOS

Senior Counsel
Gascon

THESE PUBLICATIONS MIGHT INTEREST YOU

CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

CYBERSECURITY
“I would never fall for a scam! I’m smarter than that, it could never happen to me!”    As a professional who specializes in cybersecurity and privacy law, I have extensive training on the techniques that threat actors use…
Read more
February 23, 2024
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Evelyne Chiasson https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Evelyne Chiasson2024-02-23 09:18:582024-02-23 09:21:15CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

BUSINESS LAW, CYBERSECURITY, INTELLECTUAL PROPERTY / IT, LITIGATION, REAL ESTATE LAW
As a kick-off to our educational series, we delve into explaining one such crucial industry term, "Zero-Day Exploit." In the increasingly sophisticated domain of cyber threats, the menace of Zero-Day Exploits has become hard to ignore. This…
Read more
October 24, 2023
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Karine Blais https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Karine Blais2023-10-24 12:17:142023-12-01 17:36:50UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

BUSINESS LAW, CYBERSECURITY, LITIGATION, REAL ESTATE LAW
Introduction Artificial Intelligence (AI) has been a revolutionary technology in recent years and has changed the way the world operates. AI has the ability to automate tasks, analyze vast amounts of data, and make decisions based on the…
Read more
March 1, 2023
https://gasc.sltm.ca/wp-content/uploads/2021/11/VisuelsBlogue-Autres2.jpg 628 1200 C4 Communications https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png C4 Communications2023-03-01 17:30:342023-12-01 17:36:38ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

Categories

  • BUSINESS LAW
  • COVID-19 LEGAL IMPACTS
  • CYBERSECURITY
  • DATA CENTERS
  • FIRM NEWS
  • INSURANCE
  • INTELLECTUAL PROPERTY / IT
  • LITIGATION
  • REAL ESTATE LAW
  • RECENT WORK
  • STARTUP G
© All Rights Reserve - Gascon & Associates L.L.P. Web Design C4 Communications.
  • LinkedIn
  • Contact
  • Legal Notice
  • Privacy Statement
  • Cookie Policy
Scroll to top
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}