You are here

Data Security & Privacy

Most governments, companies, organizations and universities will, at some point, fall victim to data loss or theft. It’s no surprise that recent surveys confirm that risk managers have replaced “catastrophic incident” with “cyber-attack” as their chief concern in disaster modeling. All the while, breaches continue to occur on a nearly daily basis.

CoreMotives Form Id 

What we do

LEVICK’S Data Security team is an industry leader in best practices for handling security issues that alarm customers, shareholders, boards of directors, and attorneys general. LEVICK has played a critical role in some of the largest and most impactful breaches ever, including those involving Heartland Payment Systems, Fidelity National Information Systems, and LifeLock. For Heartland, our aggressive campaign enabled the company to turn a disaster into a leadership opportunity. Today, the company’s stock value is twice what it was pre-breach and 10 times larger than it was in the immediate post-breach phase. Heartland CEO Bob Carr is even lauded as a security evangelist.
Time and again we’ve refined our approach to data loss and theft, HIPAA violations, hactivism, and state-sponsored attacks against companies and institutions. From the earliest indication of a breach to public disclosure to the reputational challenges that linger on afterward, LEVICK helps clients fulfill their compliance obligations under the law and restore trust with the audiences who matter most.
No company is immune to a security breach, whether it’s caused by malware, criminals, hackers, or a system collapse. The world will be watching how you respond. The time to start planning that response is now.
LEVICK’s Data Security team helps clients:

  • Develop data breach response preparedness processes and protocols
  • Construct early warning systems to identify symptoms of incident before they incubate
  • Stress test organizations’ existing breach identification and response processes
  • Manage communications following a cyber-attack or security breach
  • Influence public policy around cyber security and data privacy
  • Position executives as thought leaders on data security and electronic privacy issues
  • Build support in the privacy and security community to launch new products
  • Shape consumer opinions about privacy protection before, during, or after an incident

Related Case Studies

Latest Thinking

In this article originally published on, I analyze whether the benefits outweigh the risks in regards to businesses sharing cyber threat...
134 days. According to a recent report issued by the Baker Hostetler Privacy and Data Protection Team, that’s how long detection and notification...
In this LEVICK Daily video interview, Brian Finch, a Partner at Pillsbury Winthrop Shaw Pittman LLP outlines the top threats to trade secrets and the...