A step-by-step guide to assessing compromised data after a cyber incident

By Valeska Bloch, Lisa Kozaris, Karan Mehta, Isabelle Guyot, Lauren Holz
Cyber Data & Privacy Digital Transformation Legal Technology Technology, Media & Telecommunications

The most overlooked part of cyber incident response planning

Understanding the data that has been compromised in a cyber incident is generally the most critical, complex, costly, time-consuming and stressful part of any cyber incident response. And yet, compromised data assessment and notification is also the most overlooked part of cyber incident planning.

The methodology to be applied to this task and the tools and specialists the affected company may need to use are critical, yet often not considered. In this guide, we aim to address this gap and cover what to do before, and after, an incident.

This guide has been developed as a step-by-step process to help companies. It covers:

  • the key challenges faced by companies in assessing compromised data
  • practical takeaways from our recent experience advising on small and large-scale data reviews across multiple sectors
  • 11 steps and decisions to be incorporated into any template data assessment and notification methodology. 

Download guide

Complete below to download guide

Your privacy: Allens collects your personal information so we can provide and market services to you. Your information may be shared with other members of the Allens Group both in Australia and overseas. You have a right to access certain personal information that we collect and hold about you. You may contact us at Further information is available on this page.