fbpx
  • LinkedIn
  • 514 879-5606
  • The bloG
  • Careers
  • The Firm
  • Contact
  • Français
Gascon ≡ Menu
  • FIELDS OF EXPERTISE
    • REAL ESTATE LAW
      • Real Estate Acquisition and Sale
      • Commercial Lease
      • Construction
      • Co-Owner
      • Title Review
      • Real Estate Finance
      • Contractors license
      • Due Diligence
      • REAL ESTATE SHAREHOLDING AND PARTNERSHIPS
    • BUSINESS LAW
      • Shareholding and Partnerships
      • Incorporation and Dissolution of Corporations
      • Agreements, Contracts and Partnerships
      • Corporate Financings
      • Merger and Acquisition
      • Corporate Governance
      • Corporate Reorganization
    • LITIGATION AND INSURANCE
      • Collection
      • Arbitration and Mediation
      • Bankruptcy, Insolvency and Restructuring
      • Construction Litigation
      • Commercial Lease Litigation
      • Conflicts between Shareholders
      • Insurance
      • Recourse in Co-ownership
      • Civil Liability Remedies, Hidden Defects and Insurance Recourse
      • Hypothecary Recourse
      • Appeal and judicial review
    • INTELLECTUAL PROPERTY / IT
      • Trademarks
      • Confidentiality Agreements
      • Service Agreements
      • Master Services Agreement (MSA) and Irrevocable Right of Use (IRU)
      • Easements for Telecommunication Services
      • Data Center Agreements
      • Software Source Code Escrow Agreements
      • License Agreements
      • Terms of Use of a Website
    • CYBERSECURITY
      • Incident response planning
      • Breach coaching
      • Loss and liability mitigation
      • Who is at risk?
    • DATA CENTERS
      • Land acquisition and planning
      • Construction and development
      • Operations
  • The Team
  • STARTUP G PROGRAM
  • Search
  • Menu Menu

Incident response planning

Preparing your business for a cyber incident before one occurs, by completing an incident response plan with the assistance of a professional.

No matter the significance of the investment made by businesses into technology-based security systems, an essential weapon in any company’s arsenal is a well-articulated response plan, outlining how to evaluate, contain and recover from a security incident.

Delays in detection or in response to a cyber incident allow threat actors free rein, putting businesses at greater risk of being imposed regulatory fines or of experiencing a devastating loss of their customer’s trust, in addition to causing longer recovery times.

Gascon can help you by:

  • Preparing for a cyber security incident by completing a comprehensive and personalized incident response plan.
  • Serving as off-site storage location for the incident response plans of our clients so that they can be easily accessed in case of emergency.
  • Providing advice on how to avoid falling victim to a cyber security incident, based on the specific vulnerability profile of your business.

YOUR TEAM

MARY DELLI QUADRI
https://www.gascon.ca/en/mary-delli-quadri/

MARY DELLI QUADRI

Attorney, Partner
Gascon
ALEXANDRA KALLOS
https://www.gascon.ca/en/alexandra-kallos/

ALEXANDRA KALLOS

Senior Counsel
Gascon

THESE PUBLICATIONS MIGHT INTEREST YOU

CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

CYBERSECURITY
“I would never fall for a scam! I’m smarter than that, it could never happen to me!”    As a professional who specializes in cybersecurity and privacy law, I have extensive training on the techniques that threat actors use…
Read more
February 23, 2024
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Evelyne Chiasson https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Evelyne Chiasson2024-02-23 09:18:582024-02-23 09:21:15CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

BUSINESS LAW, CYBERSECURITY, INTELLECTUAL PROPERTY / IT, LITIGATION, REAL ESTATE LAW
As a kick-off to our educational series, we delve into explaining one such crucial industry term, "Zero-Day Exploit." In the increasingly sophisticated domain of cyber threats, the menace of Zero-Day Exploits has become hard to ignore. This…
Read more
October 24, 2023
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Karine Blais https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Karine Blais2023-10-24 12:17:142023-12-01 17:36:50UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

BUSINESS LAW, CYBERSECURITY, LITIGATION, REAL ESTATE LAW
Introduction Artificial Intelligence (AI) has been a revolutionary technology in recent years and has changed the way the world operates. AI has the ability to automate tasks, analyze vast amounts of data, and make decisions based on the…
Read more
March 1, 2023
https://gasc.sltm.ca/wp-content/uploads/2021/11/VisuelsBlogue-Autres2.jpg 628 1200 C4 Communications https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png C4 Communications2023-03-01 17:30:342023-12-01 17:36:38ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

Categories

  • BUSINESS LAW
  • COVID-19 LEGAL IMPACTS
  • CYBERSECURITY
  • DATA CENTERS
  • FIRM NEWS
  • INSURANCE
  • INTELLECTUAL PROPERTY / IT
  • LITIGATION
  • REAL ESTATE LAW
  • RECENT WORK
  • STARTUP G
© All Rights Reserve - Gascon & Associates L.L.P. Web Design C4 Communications.
  • LinkedIn
  • Contact
  • Legal Notice
  • Privacy Statement
  • Cookie Policy
Scroll to top
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}