The Digital Circle facilitates your organization's compliance to Bill 25 and the implementation of a comprehensive strategy to minimize your data protection risks
Prevention and compliance
Before
Privacy incident prevention training
Assessment & Diagnosis | Lunch & Learn | Training Workshops
Strategic communication and crisis management
Development of a contingency communication plan | Preparation of spokespersons
Personal data management
Complete mapping of digital information assets | Discovery and mapping of sensitive and personal data | Pre-backup mapping
Information Technology
Assist in the implementation of IT security tools and practices | Provide full IT outsourcing services
Cyber investigations and penetration tests
Intrusion tests | Strategic / tactical monitoring of hackers' tools and objectives | Meetings with white hats
Legal Services and Bill 25 Compliance
General compliance audit | Validation of your security protocols | Review of your contracts (HR, suppliers, cyber insurance, etc.) | Basic training (privacy rights, cyber security, privacy officer, etc.)
Reacting to an incident
During
Fraud prevention and cybersecurity training
Communicate in a simple way what is happening to the teams
Reputation management and crisis communication
Media crisis management (press relations) | Communication with employees and partners | Advice to management
Personal data management
Targeted mapping to identify the personal data affected during a security event
Information Technology
Assist in blocking and terminating a cybersecurity incident
Legal Services and Bill 25 Compliance
Response to privacy incidents (data theft or compromise, cyber breach, etc.) with legal counsel to support the crisis team
Restarting on the right foot
After
Fraud prevention and cyber security training
Post-mortem & Diagnostic | Lunch & Learn | Training Workshops
Reputation management and crisis communication
Integrated communication strategy to restore trust in the organization
Personal data management
Mapping of updated data for a remediation plan or compliance initiative
Information Technology
Assist in the recovery of activities and the restoration of data | Assist in the post mortem in order to put in place mitigation tools or procedures
Cyber investigations and penetration tests
Investigating employees or individuals suspected of attacks | Tracing the path of a cryptocurrency payment
Legal Services and Bill 25 Compliance
Review of the response plan, protection mechanisms and governance rules in place to ensure a better resilience of the company in case of an incident involving the compromise of personal information