<?xml version="1.0" encoding="utf-8"?><rss version="2.0"><channel><title>Thinking data</title><link>https://digitalriskexperts.co.uk:443/Contents/Item/Display/87</link><description>Thinking data</description><item><title>DRE joins with Savient to develop Savitrace</title><link>https://digitalriskexperts.co.uk:443/latest/dre-joins-with-savient-to-develop-savitrace</link><description>&lt;p class="lead"&gt;With deep domain experience in understanding how software is created and built, including the use of AI, Digital Risk Experts is honoured to have helped create a new software tool, &lt;a href="https://savitrace.com/" target="_blank"&gt;Savitrace&lt;/a&gt;, a tool that helps financial investigators navigate financial data in fraud investigations.&lt;/p&gt;
&lt;p&gt;It is already gaining a firm foothold within government agencies and financial investigation firms and DRE are pleased to support Savient to gain increased traction and visibility of such a great tool that is purposefully built to comply with the EDRM model to maintain bench-marked best practice.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Savient sat down with Lisa Burton, CEO of Digital Risk Experts, to find out more about the collaboration that has&amp;nbsp;helped shape Savitrace&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" href="/Media/Digitalriskexperts/pdf/Savitrace.pdf"&gt;&lt;i class="bi bi-file-earmark-pdf-fill fs-2"&gt;&lt;/i&gt; Read interview&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;h5&gt;&lt;a href="https://savitrace.com/" target="_blank"&gt;Find out more about Savitrace &amp;raquo;&lt;/a&gt;&lt;/h5&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://savitrace.com/" target="_blank"&gt;&lt;img width="737" height="373" alt="" src="/Media/Digitalriskexperts/Blog/savitrace.JPG" /&gt;&lt;/a&gt;&lt;/p&gt;</description><pubDate>Wed, 24 Jan 2024 09:19:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/dre-joins-with-savient-to-develop-savitrace</guid></item><item><title>Are Your Employees Inadvertently Adding Holes In Your Security?</title><link>https://digitalriskexperts.co.uk:443/latest/bridging-the-gap</link><description>&lt;p class="lead"&gt;The two best assets of any business, people and data are where most risk lurks. 80% of corporate data is unstructured, created by people, in many formats, sent internally and externally to third parties, clients, partners, suppliers, consumers, and copied, forwarded, deleted, retained, classified and tracked - often illegally.&lt;/p&gt;
&lt;p&gt;It is not surprising that IT Security and Legal, although worlds apart historically, are having to become close. We offer some pointers on how to mitigate people and data security risks.&lt;/p&gt;
&lt;p&gt;&lt;img width="1000" height="621" alt="" src="/Media/Digitalriskexperts/Images/data-breach-final2.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bridging the Gap: Are Your Employees Inadvertently Adding Holes in Your Security? &lt;/strong&gt;&lt;br /&gt;In the dynamic intersection of legal compliance and IT security, the role of employees becomes paramount. As organisations navigate the complex landscape of safeguarding data, it's essential to assess whether inadvertent actions are unintentionally poking holes in Corporate security measures.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Striking the Balance: Legal Compliance meets IT Security&lt;/strong&gt;&lt;br /&gt;Ensuring compliance with regulations is non-negotiable, but it's equally crucial to align legal mandates with robust IT security practices. Employee actions, often well-intentioned but uninformed, can create vulnerabilities. Bridging the gap between compliance requirements and the practicalities of safeguarding digital assets is precisely what DRE's expertise and solutions are about.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;As organisations navigate the complex landscape of safeguarding data, it's essential to assess whether inadvertent actions are unintentionally poking holes in corporate security measures&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;The Unseen Risks: A Call to Action&lt;/strong&gt;&lt;br /&gt;From sharing sensitive information without encryption to overlooking security protocols, employees can unintentionally compromise the very standards organisations strive to uphold.&amp;nbsp; At DRE, we are pleased to help our Corporate clients shine a light on these potential gaps and take proactive measures.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Holistic Training: Empowering Employees for Dual Success&lt;/strong&gt;&lt;br /&gt;A workforce educated on the legal implications of data handling is better equipped to contribute to a robust security posture.&amp;nbsp; In a digital world, knowledgeable human interaction with a good sprinkling of emotional intelligence can be the difference between a major data breach and alerting a problem that can be dealt with swiftly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Strategic Collaboration: IT and Legal Working Hand in Hand&lt;/strong&gt;&lt;br /&gt;Forge a seamless collaboration between your IT Security and Legal teams. Establishing clear communication channels ensures that legal mandates are translated into practical security and IT protocols.&amp;nbsp; DRE is happy to report a proven track record of helping our clients shortcut boring training to create a working solution that hits the truth of a problem fast so that the best brains in the business can resolve issues effectively, whilst enjoying collaborative creative licence to support Business strategy, informing Boards as they go.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A United Front: Navigating the Future of Security and Compliance&lt;/strong&gt;&lt;br /&gt;In a landscape where data breaches can have far-reaching consequences, a united front of Legal and IT professionals is essential.&amp;nbsp; Legal, Compliance and IT, working together as interwoven elements of a comprehensive strategy is a winner.&amp;nbsp;&lt;/p&gt;</description><pubDate>Mon, 15 Jan 2024 09:35:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/bridging-the-gap</guid></item><item><title>Regenerate</title><link>https://digitalriskexperts.co.uk:443/latest/regenerate</link><description>&lt;p class="lead"&gt;At DRE, we're fully aware of the urgency of environmental issues. Trees play a crucial role in lessening their impact, and we're committed to this cause. Our core values emphasise taking care of our planet, aligning perfectly with our partnership with GreenTheUK&lt;/p&gt;
&lt;p&gt;We believe actions prove commitment better than words, and we're proud to demonstrate our dedication through actions. Despite challenges ahead, we're motivated by knowing each planted tree brings us closer to a sustainable world for future generations.&amp;nbsp;Though our expertise lies in Legal Technology, Cyber Security, and Data Privacy, supporting the environment is also aligned with our goal. It's about safeguarding privacy rights and helping businesses ensure they meet their legal obligations regarding their data. This alignment shows our commitment to a world where people and data coexist seamlessly.&lt;/p&gt;
&lt;p&gt;&lt;img width="1200" height="818" alt="" src="/Media/Digitalriskexperts/Images/trees2.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Thank you to those of you backing this journey. Your support keeps us motivated. Feel free to share thoughts, questions, or suggestions.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class=" btn btn-lg btn-orange" href="https://greentheuk.com/case-studies/digital%20risk%20experts%20(legal%20data%20workspace)/" target="_blank"&gt;DRE and GreenTheUK&lt;/a&gt;&lt;/p&gt;</description><pubDate>Thu, 31 Aug 2023 14:53:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/regenerate</guid></item><item><title>How to protect your business when cyber insurance premiums sky rocket</title><link>https://digitalriskexperts.co.uk:443/latest/how-to-protect-your-business-when-cyber-insurance-premiums-sky-rocket</link><description>&lt;p class="lead"&gt;An organisation&amp;rsquo;s capacity to manage and contain cyber risk has become a commercial imperative. Whether it&amp;rsquo;s a major outage or a data breach, the potential financial and reputational losses from a cyber event can be devastating.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Dedicated cyber insurance can form a key part of an organisation&amp;rsquo;s response to managing cyber risk, but evaluating, mitigating and transferring cyber risk is not a tick box exercise.&lt;/p&gt;
&lt;p&gt;&lt;img width="1024" height="693" alt="" src="/Media/Digitalriskexperts/Blog/premiums5.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;The Sunday Times recently reported a 64% increase in Cyber insurance premiums which will no doubt raise eyebrows for those Executives who think the cost hike is high. Those who have been subject to a cyber-attack may be less surprised. Indeed, for those having to claim on cyber insurance, the impact of rising premiums and future cover is a significant cost and results in difficult decisions for the business forcing spending to be scaled back in other areas.&lt;/p&gt;
&lt;p&gt;The Government&amp;rsquo;s The State of Security 2023 report says that &amp;ldquo;despite new strategies and better crossorganisation partnerships, security teams face significant challenges. The bad guys aren&amp;rsquo;t slowing down, either. Globally, our research found more incidents, longer dwell times and business-impacting damage.&amp;rdquo;&lt;/p&gt;
&lt;blockquote class="py-4"&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;The Sunday Times recently reported a 64% increase in Cyber insurance premiums which will no doubt raise eyebrows&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;It is common knowledge that cyber-attacks are here to stay and have always been on the increase. Digital Risk Experts recently worked with a renowned and very well-known corporate name who came under attack from one simple phishing email.&amp;nbsp; The employee thought the email had come from IT asking them to change their login details and boom, the attackers were in and managed to stay scrutinising the business for 6 months, from many different global locations to monitor the financial transactions and ultimately, facilitate a theft.&lt;/p&gt;
&lt;p&gt;The fall out was colossal.&amp;nbsp; The fraud that enabled the attackers to steal a large amount of money was really the tip of the iceberg.&amp;nbsp; The cost of responding to the fraud was significant, as was the time spent by Senior Executives reassuring their Board, their employees and customers.&amp;nbsp; The Board instructed a cultural change, to be reflected in people and process through the improvement of IT Security, Data Protection and closing working siloes between inter-disciplinary teams such as legal and IT.&amp;nbsp; Their third-party IT provider had a role to play too - was the business getting all they were paying for from their third-party cloud provider, in particular, as it related to system security?&amp;nbsp; Legal also needed to consider whether to notify the ICO and determine whether it was a formal data breach or a cyber-attack. Their insurance company were instrumental in helping them recover some of their losses.&lt;/p&gt;
&lt;blockquote class="py-4"&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;&lt;span&gt; Digital Risk Experts worked with a renowned corporate name who came under attack from one simple phishing email...The cost of responding to the fraud was significant, as was the time spent&amp;nbsp; reassuring their Board, employees and customers&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;When cyber insurance became available, as a relatively new insurance product, underwriters had little data on which to base their assessment of risk. As the market has developed and more and more accurate and historical data has become available, underwriters have become better informed about the very real threat of attack and have responded by increasing insurance premiums. Marsh recently reported that premiums increased by up to 66% in the third quarter of 2022 compared to the previous year.&lt;/p&gt;
&lt;p&gt;Now that underwriters have more data about the frequency and nature of attacks, they are asking more searching questions of a business to ensure appropriate cover. Businesses should be proactive and ensure they have robust procedures and protections in place to reduce the risk of any attack.&amp;nbsp;&amp;nbsp; As working from home proliferated as a result of Covid-19, a further possible line of attack became apparent and businesses must respond by taking steps to protect the business such as strict password policies and two-factor authentication; reducing the amount of data being accessed, stored and transferred by employees and encrypting sensitive data and personally identifiable information.&lt;/p&gt;
&lt;blockquote class="py-4"&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;&lt;span&gt;Underwriters have become better informed about the very real threat of attack and have responded by increasing insurance premiums&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;Other ways to demonstrate a robust defence to an Insurer could be to perform regular security maturity assessments to identify potential weaknesses and be able to demonstrate a strong incident response plan in the event of an attack. It is anticipated that those businesses that can demonstrate good cyber attack controls may benefit from price stability or reductions moving forward as competition in the insurance market increases as more insurers move to cyber cover.&lt;/p&gt;
&lt;p&gt;No business wants to be in a position where their budget demands a decision being taken between improving cyber security and minimising the risk of attack, versus spending on comprehensive cyber insurance that will cover the business in the inevitable event of an attack. Prevention is always preferable to avoid loss of reputation and maintain business continuity. It is also vital for a business to be able to demonstrate to Regulators that steps are being taken to minimise risk and comply with legal requirements.&lt;/p&gt;
&lt;blockquote class="py-4"&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;Digital Risk Experts can help your business by conducting a comprehensive Efficiency, Compliance and Security Assessment to identify potential weaknesses &lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;The State of Security Report 2023 says that Data is the answer: 91% of respondents agree that better capture and analysis of detection data is one of the most effective tools to prevent successful ransomware attacks.&amp;nbsp; The question is how do organisations do that?&lt;/p&gt;
&lt;p&gt;Digital Risk Experts can help your business by conducting a comprehensive Efficiency, Compliance and Security (ECS) Assessment to identify potential weaknesses and recommend appropriate remedial action. This will allow any business to demonstrate to Insurers that steps are being taken to minimise risk and result in reduced insurance premiums.&lt;/p&gt;</description><pubDate>Fri, 02 Jun 2023 15:29:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/how-to-protect-your-business-when-cyber-insurance-premiums-sky-rocket</guid></item><item><title>Data and digital risk prevention: a business risk and a business opportunity</title><link>https://digitalriskexperts.co.uk:443/latest/data-and-digital-risk-prevention-a-business-risk-and-a-business-opportunity</link><description>&lt;p class="lead"&gt;We all know, data breaches and digital controversies can be brand affecting and detrimental to company valuation. &amp;nbsp;Yet somehow, it&amp;rsquo;s common to behave as though immune to this, protected by invisibility, and likely to rebound unaffected.&lt;/p&gt;
&lt;p&gt;Conversely company valuation increases by demonstrating leadership among peers, differentiating over competitors, and proving the ability to stabilise and strengthen business ecosystem resilience.&lt;/p&gt;
&lt;p&gt;&lt;img width="1024" height="966" alt="" src="/Media/Digitalriskexperts/Images/ldw-blog-8.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Poorly managed data creates diverse risks with significant negative effect on an organisation if unchecked. &amp;nbsp;Impact associated with breaches can be severe as a result of fines and penalties, recovery, financial and reputational costs, and other compliance challenges.&amp;nbsp; Organisations need to be vigilant to ensure the safety of their data and thereby also continued success of their business.&lt;/p&gt;
&lt;p&gt;Various means to do this exist, including ensuring contract terms incorporate data protection laws, using encryption services and malware scanners, auditing data security procedures on a regular basis, data protection training and adequate access management protocols. Indeed, 80% of data breaches are caused by internal actions of employees, which demands inside-out risk mitigation.&lt;/p&gt;
&lt;p&gt;To stay ahead of the curve, identifying emerging threats and solutions, you need to understand which state-of-the-art of data security and privacy technologies can help. &amp;nbsp;Above all, taking appropriate pre-emptive steps to protect data minimises risks and creates a safer, more secure environment for all stakeholders involved.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;80% of data breaches are caused by internal actions of employees, which demands inside-out risk mitigation.&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;Frequently data risks associated with a global contract population include non- or poor-performance, financial loss from expired auto-renewed contracts, data breaches cyber threats, litigation, class actions and lack of privacy compliance. &amp;nbsp;Risks are compounded with varying data linked to contracts (SOWs, addendums, superseded versions of originating contracts), and varied or weak processes including disparate or insecure user accessibility. &amp;nbsp;This increases complexity and data risk by as much as 100%.&lt;/p&gt;
&lt;p&gt;Examples of where inadequate safeguarding causes data privacy breaches include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Data leaks due to immaturity of storage security and protection measures &amp;ndash; contracts with third party software and IT providers must be negotiated jointly with a multi-disciplinary team of experts (comprising IT, Legal, Information Security, Tech Innovation, Compliance, and Business users)&lt;/li&gt;
&lt;li&gt;Data retention practices and policies being inaccurate or incomplete &amp;ndash; this results in hoarding data, erring on the side of caution, and the problem of data protection compliance grows (principles of minimisation, for example)&lt;/li&gt;
&lt;li&gt;With retention comes defensible deletion &amp;ndash; poorly managed data deletion requests or failing to comply with protection regulations can incur severe regulatory penalties that far outweigh the cost of mitigating effectively&lt;/li&gt;
&lt;li&gt;Data deletion requests can have a&amp;nbsp; major impact &amp;ndash; they can blow budgets due to handling and processing inefficiencies (missed deadlines, costly delays due to manual legal review processes)&lt;/li&gt;
&lt;li&gt;Poor understanding of data locations and ownership in the IT infrastructure &amp;ndash; this can cause exposure to potential data breaches&lt;/li&gt;
&lt;li&gt;Sustained adequate training for GC, DPO, and Info Sec teams is vital &amp;ndash; this avoids the risk of enforcement actions and increased scrutiny from the ICO (and those Regulators that the ICO formally confer with, such as the FCA) due to non-compliance&lt;/li&gt;
&lt;li&gt;Any large number of disparate, siloed systems and data sources &amp;ndash; these increase the complexity of structured and unstructured data, and the risks spiral.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Siloed working is perhaps the greatest risk of all in relation to data risk management. &amp;nbsp;This is common for those working within large corporates. &amp;nbsp;Digital Risk Experts counteracted this by forming the concept of a Digital Risk Committee (DRC) which delivers real benefit inside client organisations.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;strong&gt;&lt;span&gt;Siloed working is perhaps the greatest risk ... Digital Risk Experts counteracted this by forming the concept of a Digital Risk Committee&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;DRCs bring together an&amp;nbsp;internal&amp;nbsp;multi-disciplinary team (efficiently bridging legal, IT, compliance, finance, HR, marketing) to enable business to alleviate siloed working,&amp;nbsp;overcome poorly instructed and expensive&amp;nbsp;third-party&amp;nbsp;services, better manage past and current risks as&amp;nbsp;well as envisage the future of&amp;nbsp;the business using multiple sources of insight.&lt;/p&gt;</description><pubDate>Thu, 13 Apr 2023 10:45:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/data-and-digital-risk-prevention-a-business-risk-and-a-business-opportunity</guid></item><item><title>IFA Business Owner? How to ward off FCA and ICO attention </title><link>https://digitalriskexperts.co.uk:443/latest/ifa-business-owner-how-to-ward-off-fca-and-ico-attention</link><description>&lt;p class="lead"&gt;We all know trust drives growth, especially in matters financial. But it&amp;rsquo;s more than being relied upon to give great advice. Trust in your technology is part of the trust people have in you and your brand. Sadly, embarrassing losses of extremely sensitive and valuable data occurs with unnerving frequency in Financial Services.&lt;/p&gt;
&lt;p&gt;To combat this many large corporations are introducing the role of Chief Trust Officer (CTO) as customers emphasis the need to know their data is safe. We looked at how you can be your own CTO and enable your clients to continue to have their trust in everything you do. This also makes it easier to recommend you to others when they are choosing an Independent Financial Advisor (&amp;ldquo;IFA&amp;rdquo;).&lt;/p&gt;
&lt;p&gt;&lt;img class="img-fluid" width="1200" height="800" alt="" src="/Media/Legal/Blog/breach2.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;In a recent study, the average total cost of a data breach increased and is nearly &amp;pound;4 million, the highest ever recorded. Moreover, costs were even higher when remote working was presumed to be a factor in causing the breach. The financial impact of a data breach can be devastating to a business. The continuous increase in digital communications is providing plenty of opportunities for breaches to occur. In addition, the change to working practices contributes to organisations experiencing a data breach due to a remote employee and incidents are taking on average 29 days longer&amp;nbsp;to identify and contain.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;Through our proven, Efficiency, Compliance and Security (ECS) Assessment, LDW help IFAs quickly find a significant number of issues that explain often deeply woven and multi-layered problems.&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;The UK&amp;rsquo;s financial markets are stringently regulated by the Financial Conduct Authority (&amp;ldquo;FCA&amp;rdquo;) and The Information Commissioner&amp;rsquo;s Office (&amp;ldquo;ICO&amp;rdquo;) who work closely together, one reporting to the other any mismanagement of funds (proven via financial data flows) and evidence of poor security around data, IT, technical and ways of working.&amp;nbsp; Failure to demonstrate activity in your control framework (even where the underlying policies are well-written documents), will mean the Regulators home in on a business &amp;ndash; more demand is put on an already stretched Executive team.&lt;/p&gt;
&lt;p&gt;Recently, LDW engaged with an IFA Group whose top executives are almost entirely focused on growth by acquisition, strategic planning and the bigger picture.&amp;nbsp; They love the buzz of a constant stream of new acquisitions and investments.&amp;nbsp;&amp;nbsp; They do not get involved in the post deal integration, or the day-to-day steep compliance demands their business continually faces. &amp;nbsp;Living on the highs of &amp;lsquo;new deals buzz&amp;rsquo; the stark reality of the Company&amp;rsquo;s (and directors&amp;rsquo;) legal duties relating to financial and data protection compliance became underestimated.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Problem&lt;/strong&gt;&lt;br /&gt;Highly acquisitive, fast paced, forward looking IFAs find their internal teams taking the strain on managing the &amp;lsquo;operational flow&amp;rsquo; and juggling the multi-layered things that need time to think through that go right to the heart of IT, security, data protection and people, including culture. It is without doubt through the collapse of Asset Wealth Portfolio businesses reported in the press, that many of these complex problems leave people exposed to cyber threat (as easy as a single click on a phishing email), embarrassing data breaches, and reputational damage.&lt;/p&gt;
&lt;p&gt;This is not &amp;lsquo;scare mongering&amp;rsquo; &amp;ndash; this is a real threat. &amp;nbsp;&amp;nbsp;95% of e-mail breaches are caused by human error. Although cybersecurity solutions often focus on email threats such as phishing and malware, it is important to recognise that the majority of data breaches stem from people, with half of individuals at work admitting to unintentionally wrongly sending an email containing sensitive information.&amp;nbsp; Reputation is an IFA&amp;rsquo;s greatest asset &amp;ndash; the foundation for acquiring and retaining clients. However, it has been revealed that businesses who do not take the right steps to protect their clients&amp;rsquo; data are suffering the consequences; losing customers due to security issues.&lt;/p&gt;
&lt;p&gt;When these threats become reality, then the group, and its top executives will be embroiled in having to deal with the ICO and FCA to explain themselves. Calling investors and portfolio businesses to announce they have been victims of a cyber-attack, or a serious data breach is a very unpleasant task for an IFA business leader - causing intense stress and worry for them, their team, their families as well as their clients.&lt;/p&gt;
&lt;p&gt;When IFAs continue to build and execute on their acquisition targets without addressing these risks, they only become deeper and more expansive.&amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can IFAs Shore up their Security Posture Fast?&lt;/strong&gt;&lt;br /&gt;Through our proven, Efficiency, Compliance and Security (ECS) Assessment, LDW help IFAs quickly find a significant number of issues that explain often deeply woven and multi-layered problems. These are presented in a way that is easy to understand showing their impact (critical, high, medium, low) based on a logical division of business departments and functions. &amp;nbsp;The ECS Assessment findings provide the insight to inform pragmatic security and data protection compliance recommendations, and both are presented in a &amp;lsquo;plain English&amp;rsquo;, succinct report&amp;nbsp; for the Executive and Board to grasp the risks and work out the path to green and stabilise their business.&lt;/p&gt;
&lt;p&gt;A detailed roadmap including a plan of urgent remedial actions to address key priorities quickly move the IFA into a safe and secure operational &amp;lsquo;status quo&amp;rsquo; and can normally be executed within 1 -3 months. The remedial works form the foundations of a longer term, 360-degree holistic data protection and cyber security framework.&amp;nbsp; One IFA we worked with used this to help them successfully establish how they would grow to achieve their target of portfolio wealth management to &amp;pound;25bn within their target timeframe. &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;LDW&amp;rsquo;s Digital Risk Committee &amp;ndash; Highly Effective, No Cost&lt;/strong&gt;&lt;br /&gt;A highly effective tool that LDW has implemented with many clients is the implementation of our Digital Risk Committee solution, alleviating siloed working and poorly instructed and therefore expensive&amp;nbsp;third-party&amp;nbsp;services. &amp;nbsp;Because it brings together an&amp;nbsp;internal&amp;nbsp;multi-disciplinary team of legal, IT, compliance, finance, HR and marketing, the elected Chair, (usually Legal since all problems normally land back at Legal&amp;rsquo;s desk!) can hear the past and envisage the future of&amp;nbsp;the business using multiple pieces of insight. A Digital Risk Committee proactively manages broad,&amp;nbsp;complex topics like security and privacy, that every part of the business is immersed in and find hard to control even with strategic plans in place.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;A monthly meeting and a tracked agenda to manage initiatives and risks can really help unlock unseen business potential through this collective &amp;lsquo;eye&amp;rsquo; into the business.&lt;/p&gt;
&lt;p&gt;It is all about the customer and our day to day activities should be designed to enable their needs to be met. Doing that and protecting yourself can make for challenging decisions. We believe ECS helps make sure that there is never a choice between what&amp;rsquo;s best for the company and what&amp;rsquo;s best for the customer.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Feel free to contact Lisa or Andy (details below) to discuss how an ECS Assessment might help IFA leaders sleep soundly at night!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;CEO Lisa Burton. Mobile: 07557 094635. E-mail:&amp;nbsp;&lt;a href="mailto:lisa@legaldw.com"&gt;lisa@legaldw.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Andrew Mills. Mobile: 07947 804792. E-mail:&amp;nbsp;&lt;a href="mailto:andy@legaldw.com"&gt;andy@legaldw.com&lt;/a&gt;&lt;/p&gt;</description><pubDate>Tue, 13 Dec 2022 10:11:48 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/ifa-business-owner-how-to-ward-off-fca-and-ico-attention</guid></item><item><title>Dora the data explorer</title><link>https://digitalriskexperts.co.uk:443/latest/dora-the-data-explorer</link><description>&lt;p class="lead"&gt;The Digital Operational Resilience Act (DORA) is an EU Regulation aimed at the financial sector. It contains extensive requirements that businesses need to be aware of and preparing for.&lt;/p&gt;
&lt;p&gt;Although it will not apply directly to the UK, legislation is expected shortly to mirror the provisions. In any event, you need to be aware of the requirements if your business operates in any of the following sectors:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Banks and financial institutions (PE houses, debt funds, alternative finance providers)&lt;/li&gt;
&lt;li&gt;Stockbrokers&lt;/li&gt;
&lt;li&gt;Independent financial advisers&lt;/li&gt;
&lt;li&gt;Insurance providers&lt;/li&gt;
&lt;li&gt;Information and communication technology &amp;ndash; such as cloud based service or IT providers&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;DORA is expected to come into force in the EU in August 2022, and its aim is to harmonise security standards across EU member states to "ensure the operational resilience of the financial sector". It will also apply to UK businesses that have an EU subsidiary, or who provide services to the EU.&lt;/p&gt;
&lt;p&gt;&lt;img width="1200" height="798" alt="Dora The Digital Operational Resilience Act" src="/Media/Legal/Blog/ldw-finance4.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Anyone that fails to comply with the provisions will be liable for a significant fine of up to 1% of the annual worldwide turnover of the company per day, until compliance is achieved, for up to 6 months. By way of example, HSBC announced revenue of $49.6billion in 2021. Were they to fall foul of the new legislation, the fine would be in excess of $135million per day for up to 6 months, a maximum fine of $24.8billion. This demonstrates how seriously the DORA requirements must be taken to ensure that compliance is achieved well in advance of the implementation date.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;Anyone that fails to comply with the provisions will be liable for a significant fine of up to 1% of the annual worldwide turnover of the company per day, until compliance is achieved.&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;The most significant provisions of DORA, which are expected to be mirrored across other jurisdictions are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Regular and detailed risk management of ICT systems -to ensure continuing compliance with requirements.&lt;/li&gt;
&lt;li&gt;Digital operational resilience testing - to regularly test systems to identify potential weaknesses, deficiencies and gaps. The scope of the testing will vary according to the size and resources of a company or institution.&lt;/li&gt;
&lt;li&gt;ICT-related incident reporting - which will require an incident to be logged, classified in terms of severity and "major" incidents reported to the relevant authorities&lt;/li&gt;
&lt;li&gt;Establishing strong business recovery policies - to include disaster and recovery plans.&lt;/li&gt;
&lt;li&gt;Sharing information and intelligence - in relation to cyber threats and vulnerabilities identified.&lt;/li&gt;
&lt;li&gt;Specific contractual requirements - in contracts between ICT third-party service providers and financial entities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition to DORA, there are several other important legislative changes in the pipeline worldwide which aim to build digital resilience and will significantly change the operating requirements in all markets. This legislation includes:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The UK Telecommunications Security Act 2021 which will expand security duties for providers of public electronic networks and services covering identification and reduction of risks, incident response and breach notifications.&lt;/li&gt;
&lt;li&gt;EU Proposed NIS2 Directive - another political agreement reached on 13th May 2022 which will expand the sectorial base of regulation (e.g. public administration, medical device, manufacturing, critical product manufacturing) and nature of duties (e.g. management accountability, supply chains) with tougher enforcement measures.&lt;/li&gt;
&lt;li&gt;EU Proposed AI Regulation &amp;ndash; which will introduce new cyber security rules for AI to reduce risks whilst allowing innovation.&lt;/li&gt;
&lt;li&gt;EU Digital Markets Act and Digital Services Acts - both aim to harmonise the law on digital services in the EU.&lt;/li&gt;
&lt;li&gt;Strengthening American Cybersecurity Act 2022 - focus on incident and ransomware reporting and a risk-based approach to cybersecurity management.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The legislative landscape is changing rapidly and businesses need to be prepared to avoid the huge potential fines. They should be conducting DORA Readiness Assessments at the earliest opportunity to identify risks and potential vulnerabilities in their systems. All IT policies and protocols must be reviewed and steps taken to prepare for digital resilience testing. Procedures for reporting and classifying incidents will also be necessary and all staff must be trained effectively on the wide range of increasing regulatory requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description><pubDate>Wed, 29 Jun 2022 12:33:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/dora-the-data-explorer</guid></item><item><title>You'd be nuts to ignore the increasing risk of cyber attacks on your business</title><link>https://digitalriskexperts.co.uk:443/latest/you-d-be-nuts-to-ignore-the-increasing-risk-of-cyber-attacks-on-your-business</link><description>&lt;p class="lead"&gt;The company that owns brands such as KP Nuts and Hula Hoops was recently targeted by a ransomware cyberattack.&lt;/p&gt;
&lt;p&gt;The company has reported that this will result in supply chain issues and a shortage of crisps and nuts as the company will be unable to "safely process orders or dispatch goods".&lt;/p&gt;
&lt;p&gt;&lt;img width="971" height="506" alt="" src="/Media/Legal/Blog/nuts-banner.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Criminals can launch a cyber-attack using malware to infiltrate an IT system and steal data which they encrypt and demand a significant ransom to release, often millions of pounds/dollars. It was reported that the KP attack targeted highly sensitive information, including credit card statements, employee addresses and telephone numbers.&lt;/p&gt;
&lt;p&gt;The UK's National Cyber Security Centre (NCSC) has recommended businesses strengthen their digital security in light of increasing attacks in recent years. They issued a Joint Advisory explaining that "&lt;em&gt;in 2021, cyber security authorities in the United States, Australia, and the United Kingdom observed an increase in sophisticated, high-impact ransomware incidents against critical infrastructure organisations globally.&amp;nbsp;Ransomware tactics and techniques continued to evolve in 2021, which demonstrates ransomware threat actors&amp;rsquo; growing technological sophistication and an increased threat to organisations globally."&lt;/em&gt; The NCSC recommends that businesses focus on reducing their vulnerability to attacks&amp;nbsp;in the first place and reducing the impact of any successful attack.&lt;/p&gt;
&lt;p&gt;The best way to prevent an attack is for a business to secure their data as strongly as possible by maintaining effective and up-to-date antivirus protection and firewalls; ensuring robust and regular backups so that lost data can be recovered for the business; and to train staff to recognise risks such as clicking on unknown weblinks or opening suspicious emails.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;span&gt;In the event of a cyber-attack, all businesses should have an established cyber security and data protection response to reduce downtime for the business and protect reputation &lt;/span&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;Most data risk that incurs a data leak or breach lurks in the 90% of communications data such as emails, documents, spreadsheets.&amp;nbsp; Given inefficiencies through human error and employee psychology and less than robust processes, businesses leave themselves exposed to the risk of their cyber insurance policies not covering them - regardless of the strength of any IT security accreditation. Resources spent in prevention would be significantly less than the financial impact of any successful attack.&lt;/p&gt;
&lt;p&gt;In the event of a cyber-attack, all businesses should have an established cyber security and data protection response&amp;nbsp;to reduce downtime for the business and protect reputation and share price. Businesses should also consider lessons learned and steps that can be taken to reduce the impact of the attack and prevent future attacks.&lt;/p&gt;
&lt;p&gt;The NCSC regularly provides information on cyber threats and advanced malware that is being utilised by criminals. They are currently&amp;nbsp;highlighting the increased security threat from anticipated Russian cyber-attacks which are understood to have been used against Ukraine prior to the military invasion. As a result, they recommend &amp;ldquo;&lt;em&gt;organisations in the UK to bolster their online defences&amp;rdquo;.&lt;/em&gt; There has never been a more important time for a business to protect their data from attack.&lt;/p&gt;
&lt;h4 class="text-orange"&gt;Take Action&lt;/h4&gt;
&lt;p&gt;Digital Risk Experts&amp;nbsp;can perform an Initial ECS (Efficiency, Compliance and Security) assessment to help you better understand the level of risk your organisation might be exposed to.&amp;nbsp;&amp;nbsp;&lt;/p&gt;</description><pubDate>Fri, 11 Mar 2022 10:00:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/you-d-be-nuts-to-ignore-the-increasing-risk-of-cyber-attacks-on-your-business</guid></item><item><title>Volume of data - a help or a hindrance in the legal world?</title><link>https://digitalriskexperts.co.uk:443/latest/volume-of-data-a-help-or-a-hindrance-in-the-legal-world</link><description>&lt;p class="lead"&gt;Dame Victoria Sharp DBE, President of the Queen's Bench Division, recently gave a speech at the National Criminal Justice Conference commenting on technology and digital data challenges.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Since 80% of data breaches are insider threat (weak and inefficient processes, employee errors or fraudulent activity,&amp;nbsp;as well as supply chain errors) logic dictates that you start negating that threat from inside too. That is Digital Risk Expert&amp;rsquo;s mission, helping corporate clients and GCs manage the cost-risk of data as well as unlock its value as an asset.&lt;/p&gt;
&lt;p&gt;Read Rachel Mill&amp;rsquo;s summary of the speech below for a quick overview of how Courts are highlighting the risks of digital data that is growing exponentially in complexity and volume. While presenting issues for law enforcement and the Courts in how data is handled and presented, there&amp;rsquo;s acknowledgment too that it is providing corporate cyber criminals with more opportunity for "crime, deviance and misuse".&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Rachel Mills writes:&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;As the use of technology increases in everyday life, so does the volume of data created.&amp;nbsp;It is estimated that 2.5 quintillion bytes of data were created every day in 2021. 90% of the data in the world was created in the last two years and moving forward, it is expected that the volume of data will double every two years.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;span&gt;There are two challenges with digital data and they are the volume of available data and the need for judges and jurors to understand the digital data presented to them at trial.&lt;/span&gt;&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;In her recent speech, Dame Victoria Sharp DBE, President of the Queen's Bench Division acknowledged the increasing dependence of the world and the criminal justice system on technology and the proliferation of technology and how it has changed "how individuals behave and engage with the world around them".&amp;nbsp;&lt;/p&gt;
&lt;p&gt;She commented that there are two challenges with digital data and they are the volume of available data and the need for judges and jurors to understand the digital data presented to them at trial.&amp;nbsp;&amp;nbsp;Very few cases are now presented to a jury without digital evidence whether that is text messages, emails or triangulation data that can place a Defendant within a known area at the time of an offence. This creates new challenges for the Police and legal teams in gathering relevant digital information, storing that information and ensuring the quality and integrity of that evidence. Unless that digital evidence can be shown to be credible, it risks failing the admissibility test and cannot be presented to the Court.&lt;/p&gt;
&lt;p&gt;Dame Victoria Sharp also commented that the huge volume of data now presents&amp;nbsp;opportunity for "crime, deviance and misuse" and that this had led to the development of new types of crime and unprecedented challenges for those investigating these new types of crimes.&lt;/p&gt;
&lt;p&gt;It is clear that the volume of data is increasing exponentially and it is more important than ever that businesses secure their data, manage it to comply with relevant regulations and prevent criminal misuse.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description><pubDate>Tue, 01 Feb 2022 16:33:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/volume-of-data-a-help-or-a-hindrance-in-the-legal-world</guid></item><item><title>How artificial and human intelligences are coming together to change the early data assessment game</title><link>https://digitalriskexperts.co.uk:443/latest/ai-human-intelligence-data-assessment</link><description>&lt;p class="lead"&gt;Early data assessment is changing. Legal consultant &lt;strong&gt;Rachel Mills&lt;/strong&gt; explains why.&lt;/p&gt;
&lt;p&gt;The logic of early data assessment has always been undeniable, even more so now given the technological advances we&amp;rsquo;ve seen in recent years. Solutions like Reveal-Brainspace have added powerful emotional and sentiment analysis capabilities to traditional text search tools, giving us even richer insights in those critical early days. What&amp;rsquo;s not to like? Well, that would be the habitual fear of incurring early costs obviously, so we often get a &amp;lsquo;no&amp;rsquo; to EDA, even though just as often this initial refusal turns into later regret.&lt;/p&gt;
&lt;p&gt;What if AI can be leveraged to highlight &amp;lsquo;risky&amp;rsquo; data that may be indicative that settlement is prudent or an award of damages is likely? This would have to be tailor-made to particular clients or types of claims to be most effective but is this where data-driven insight helps logic battle habit and triumph in the fight for early data assessment? &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Let&amp;rsquo;s first review the &amp;lsquo;Why didn&amp;rsquo;t we settle on day one?&amp;rsquo; scenario. It should be familiar and goes something like this:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In all forms of dispute resolution, clients often look back with the benefit of hindsight and say, had we settled earlier, we would have saved costs. This is particularly so in class actions or group litigation where multiple claims of a low value can result in a significant payout and excessive costs.&lt;/li&gt;
&lt;li&gt;If litigators knew what data relating to a case might be available earlier, it could significantly impact litigation strategy and the ultimate decision of when or if to settle. This would ultimately reduce the costs for both parties.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Clients often say at the beginning of litigation that there is no chance of a settlement because they consider there has been no negligence. At that stage, disclosure has not taken place and the parties are unaware of the information available to support a claim or a defence. They are also concerned about their reputation and spurious claims.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;There is a reluctance to be seen to settle claims as a commercial decision in order to reduce the final bill for damages and costs. Consequently, there is a settlement at a later stage when the cost of litigation and the risk of paying claimants&amp;rsquo; cost becomes too high. The parties have also entrenched their positions by this stage which makes settlement more difficult and often more expensive. Claims generally settle after disclosure when the parties become aware of the potential data available that will impact the claim.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Class actions often have a huge amount of data that needs to be gathered and interpreted before an accurate&amp;nbsp;cost-benefit analysis can take place. If data analysis can happen at an earlier stage, and more effectively, this can determine whether class actions should be settled or defended at an early stage.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;The issue with early data assessment is that clients need to &amp;ldquo;front-end&amp;rdquo; the cost of litigation so that they spend money on data analysis early to avoid costs escalating later. Some are reluctant to do this but must understand that it could ultimately save unnecessary costs and assist with future claims analysis.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;Solutions like Reveal-Brainspace have added powerful emotional and sentiment analysis capabilities to traditional text search tools, giving us even richer insights in those critical early days&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;With the skilled use of AI, you can overcome that reluctance by offering much more certainty. Our own legal technologists, for example, have the ability to create AI libraries that can learn patterns in data over and over again; this sort of data sampling and the inferences taken from it make early evaluation of a case a very much more exact science.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;When you pair that technology with the right human intelligence &amp;ndash; the investigators and case reviewers &amp;ndash; you can also be confident of having quality judgements based on quality data sets. That sort of empowerment early on can put you in a very strong position for early settlement negotiations or an advantageous strategy at the Case Management Conference.&lt;/p&gt;
&lt;p&gt;Old habits die hard. But AI is breathing life into new ones when it comes to early data assessment.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;&lt;/h3&gt;
&lt;/blockquote&gt;</description><pubDate>Thu, 11 Nov 2021 13:04:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/ai-human-intelligence-data-assessment</guid></item><item><title>Cyber insurance and data protection </title><link>https://digitalriskexperts.co.uk:443/latest/cyber-insurance-and-data-protection</link><description>&lt;p class="lead"&gt;Cyber insurance and data protection - how do they relate to one another?&amp;nbsp; Here at &lt;span&gt;Digital Risk Experts&amp;nbsp;&lt;/span&gt;it&amp;rsquo;s clear that the two are becoming inextricably linked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Your cyber insurance &amp;ndash; will it pay out on a data breach when you left one of your &amp;lsquo;business gates&amp;rsquo; open' for hackers to get in (think TalkTalk in 2015).&amp;nbsp; Does it need to be Armageddon before your policy will pay out? Are you deductibles excruciating?&amp;nbsp;&amp;nbsp;Boards need to understand that data risk equals financial risk.&amp;nbsp;In this&amp;nbsp; podcast CEO Lisa Burton talks to Jon Nottingham of Gen2 Insurance about the cyber insurance market and how the right approach to data protection will afford you the best financial protection.&lt;/p&gt;
&lt;p&gt;&lt;iframe width="100%" height="150" style="border: none; min-width: min(100%, 430px);" title="Cyber insurance and data protection" allowtransparency="true" scrolling="no" data-name="pb-iframe-player" src="https://www.podbean.com/player-v2/?i=vxj9q-110ada9-pb&amp;amp;from=pb6admin&amp;amp;share=1&amp;amp;download=1&amp;amp;rtl=0&amp;amp;fonts=Arial&amp;amp;skin=1&amp;amp;font-color=auto&amp;amp;btn-skin=7"&gt;&lt;/iframe&gt;&lt;/p&gt;</description><pubDate>Tue, 19 Oct 2021 15:59:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/cyber-insurance-and-data-protection</guid></item><item><title>Digital Risk Experts &amp; Reveal to deliver richer client experience</title><link>https://digitalriskexperts.co.uk:443/latest/digital-risk-experts-reveal-to-deliver-richer-client-experience</link><description>&lt;p class="lead"&gt;&lt;span&gt;Digital Risk Experts&lt;/span&gt;&amp;nbsp;designates Reveal as its Preferred SaaS-Based AI Platform&lt;/p&gt;
&lt;p&gt;September 9, 2021 - Brainspace,&amp;nbsp;the global provider of the leading AI-powered eDiscovery platform, announced today that Legal Data Workspace has engaged the AI technology powerhouse to provide superior, end-to-end solutions driving today&amp;rsquo;s forward-thinking legal organisations.&amp;nbsp;As the leading data management company, Legal Data Workspace work with the most intelligent, user-friendly AI solutions. Their solid relationship with Reveal Brainspace enables our team to deliver a richer client experience.&lt;/p&gt;
&lt;p&gt;&amp;ldquo;Our platform has completely redefined AI innovation in the practice of law. Fueled by the world&amp;rsquo;s most powerful AI technology and backed by the largest team of data scientists in the industry, Reveal is uniquely positioned to fulfill &lt;span&gt;Digital Risk Experts&lt;/span&gt;&amp;rsquo; eDiscovery needs,&amp;rdquo; said Wendell Jisa, founder &amp;amp; CEO of Reveal. &amp;ldquo;We&amp;rsquo;re looking forward to working with the&lt;span&gt;Digital Risk Experts&lt;/span&gt; team and helping the entire organization gain a massive competitive advantage in a rapidly evolving space.&amp;rdquo;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Digital Risk Experts&lt;/span&gt;&amp;nbsp;will take full advantage of Reveal&amp;rsquo;s platform, which includes industry-leading processing, early case assessment, AI, review, production functionality and&amp;nbsp;customizable&amp;nbsp;API-enabled back end, along with superior visual analytics. For the first time, all of these superior AI-powered technologies are now available on&amp;nbsp;one comprehensive hub &amp;ndash; creating a customer experience unrivaled in the industry.&amp;nbsp;&lt;span&gt;Digital Risk Experts&lt;/span&gt; will be specifically leveraging the platform for instant ability to provide our clients with the best AI toolset to manage ad hoc data assessment/analytics requests in addition to eDiscovery and Managed Document Review projects.&lt;/p&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6 pt-3"&gt;I am truly delighted to be working with Reveal Brainspace &amp;ndash; an intelligent integration of the best tools that delivers ease of use and pragmatic workflows for users&lt;/h3&gt;
&lt;footer&gt;
&lt;h6 class="pt-3 pb-3"&gt;Lisa Burton, CEO Digital Risk Experts&lt;/h6&gt;
&lt;/footer&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;span&gt;Digital Risk Experts&lt;/span&gt;&amp;nbsp;selected Reveal&amp;rsquo;s eDiscovery solution because it allows for the frictionless automation of key eDiscovery processing, data analytics, utilisation of sophisticated artificial intelligence models for review, compliance and more &amp;ndash;&amp;nbsp;all&amp;nbsp;of which can be used across their operations.&lt;/p&gt;
&lt;p&gt;Lisa Burton, CEO of&amp;nbsp;&lt;span&gt;Digital Risk Experts&lt;/span&gt; said &amp;ldquo;As a Legal Technologist for 25 years and having worked with all of the eDiscovery platforms, witnessing the growth of the TAR, CAL and AI technologies in the space, somewhat tested under the stringent eye of UK Courts, I am truly delighted to be working with Reveal Brainspace &amp;ndash; an intelligent integration of the best tools that delivers ease of use and pragmatic workflows for users &amp;ndash; and one that the team at&amp;nbsp;&lt;span&gt;Digital Risk Experts&lt;/span&gt; is proud to offer in our suite of top products.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Digital Risk Experts&lt;/span&gt;&amp;nbsp;is one of more than 36 organisations that have selected Reveal&amp;rsquo;s AI-powered solutions since the start of 2021. The influx of new client wins for Reveal reflects the growing demand for what the company is offering &amp;ndash; frictionless automation of custom eDiscovery workflows.&lt;/p&gt;
&lt;p&gt;These new, strategic partnerships come on the heels of other significant moves made by Reveal shaping the legal industry. In less than six months, Reveal has merged with the&amp;nbsp;two leading AI solutions, Brainspace and NexLP&amp;nbsp;&amp;ndash; catapulting the company to its position as the largest legal-focused AI provider globally. Reveal&amp;rsquo;s customers include the leading legal service providers, law firms, corporations and government agencies around the globe.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 09 Sep 2021 15:01:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/digital-risk-experts-reveal-to-deliver-richer-client-experience</guid></item><item><title>Why M&amp;A needs data due diligence  </title><link>https://digitalriskexperts.co.uk:443/latest/why-m-a-needs-data-due-diligence</link><description>&lt;p class="lead"&gt;Let&amp;rsquo;s talk about due diligence in the Mergers &amp;amp; Acquisitions process. Most people know it contains financial due diligence, commercial due diligence, legal and often environmental due diligence.&lt;/p&gt;
&lt;p class="lead"&gt;&lt;img class="img-fluid&amp;quot;" width="1920" height="1280" alt="Due diligence in the Mergers and Acquisitions" src="/Media/Legal/Images/report.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;However, in an increasingly digital age, where data is or can be as valuable as what the business does itself, the one facet of diligence that is lacking, at present is DATA due diligence.&lt;/p&gt;
&lt;p&gt;The Global M&amp;amp;A market in 2020 was $3.7trn, and in the UK it was valued at c&amp;pound;350bn.&lt;/p&gt;
&lt;p&gt;In a survey by EY, 57% of CEOs said they would consider an acquisition in the next 12 months as a means of growth. The M&amp;amp;A and transactions market is expected to be buoyant in the next 1-3 years. But set this against an increasingly disturbing cyber risk landscape:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ransomware attacks have increased by 195% on 2019 levels, and will only continue to increase;&lt;/li&gt;
&lt;li&gt;Cost to UK companies alone in 2020 was c&amp;pound;350m of malware and ransomware attacks. Globally that is estimated to be a $20bn problem;&lt;/li&gt;
&lt;li&gt;80% of cyber breaches/security threats are generated through insider threats; and&lt;/li&gt;
&lt;li&gt;90% of data is &amp;ldquo;dark&amp;rdquo;. What does your business know about the data it generates at present?&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;h3 class="text-orange display-6"&gt;Data due diligence helps&amp;nbsp;identify any gaps in a company&amp;rsquo;s IT, data and security packages where ransomware and malware programmes could enter the system&lt;/h3&gt;
&lt;/blockquote&gt;
&lt;p&gt;GDPR and data protection has recently focused the need for companies of all sizes to be ever more mindful of its customers&amp;rsquo; data protection, and also of the opportunity to recognise the potential to their businesses of accessing, harnessing and understanding and using their customers&amp;rsquo; data. This can enable them to anticipate sales trends, and tailor sales and product/service offerings that are more targeted and have a higher chance of stronger take up from customers.&lt;/p&gt;
&lt;p&gt;From an M&amp;amp;A perspective, the benefits of data due diligence are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Helps identify in the early stages any gaps in a company&amp;rsquo;s IT, data and security packages where ransomware and malware programmes could enter the system &amp;ndash; enabling them to be &amp;ldquo;plugged&amp;rdquo; before any attack;&lt;/li&gt;
&lt;li&gt;Avoids having to pay ransom and be held hostage, taking management time and focus in dealing with the attack, thereby not running the business;&lt;/li&gt;
&lt;li&gt;Avoiding an attack avoids current and future insurance issues and disputes with insurers;&lt;/li&gt;
&lt;li&gt;Avoids data breaches/fines/reputation issues and hits to confidence, and for publicly listed companies, a severe potential knock-on share price that would far exceed any fine/ransom or insurance issue;&lt;/li&gt;
&lt;li&gt;For acquisitive companies or Private Equity houses backing corporate acquisitions, it will also protect and enhance exit multiples when the business is eventually sold &amp;ndash; less opportunity for an acquirer to price chip/put forward a disadvantageous deal structure on acquisition (such as consideration being held in an escrow account for a long period of time, and turning into quasi earn out consideration)&lt;/li&gt;
&lt;/ul&gt;</description><pubDate>Tue, 03 Aug 2021 15:32:00 GMT</pubDate><guid isPermaLink="true">https://digitalriskexperts.co.uk:443/latest/why-m-a-needs-data-due-diligence</guid></item></channel></rss>