Overview
Key Servicesshow
Cyber breach incidents have evolved beyond technical issues to pose significant legal and reputational risks for companies. Through close collaboration among our information security experts, IT forensics analysts, and attorneys specialized in data privacy and cybersecurity, our CIR Practice provides a one-stop total service throughout all stages, including prevention and detection of security threats, response to cyber incidents, and post-incident risk management.
One-Stop Services for Crisis Response
When cyber attacks strike, companies face complex and diverse crises in a short period of time. Our CIR Practice provides a “one-stop total service” comprised of the following step-by-step, field-specific solution, covering all areas from cyber incident response, technical analysis, brand protection, compliance with applicable laws and regulations, and handling regulatory investigations.
-
Cyber Incident Response & Technical Analysis: Our CIR Practice immediately activates a response team at the “golden time” when a cyber incident occurs, enabling our clients to take emergency measures, such as system isolation, evidence preservation, data recovery, and prevention of any potential spillovers. The CIR Practice conducts digital forensics, logging analyses, and vulnerability reproduction tests to clarify technical facts and secure basic data for future regulatory/dispute responses. In that process, the CIR Practice provides actionable insights derived from the hands-on experience of cybersecurity management experts, outstanding technical skills of cyber breach analysts and white-hat hackers, our digital forensics capabilities, and our firm’s global partnerships.
-
Compliance with Laws and Regulations: Our CIR Practice provides comprehensive support to clients for their compliance with any statutory obligation to file reports with the regulatory authorities at home and abroad in cyber incidents. Rather than simply acting as an agent for the fulfilment of such obligations, the CIR Practice clarifies the key requirements of the Personal Information Protection Commission (“PIPC”), the Ministry of Science and ICT (“MSIT”), and the Korea Internet & Security Agency (“KISA”), thereby preventing penalties resulting from incomplete reporting. For the obligation to file reports with overseas regulatory agencies, our CIR Practice thoroughly analyzes the regulations of each country and works closely with local legal experts to support our clients in establishing an integrated and systematic global response strategy.
-
Response to Investigations: With respect to fact-finding surveys, on-site investigations, and requests for information by the PIPC, MSIT or KISA, our CIR Practice closely communicates with the relevant case team and responds to their requests in a proactive manner. Through these efforts, we effectively advocate the positions of our clients to the regulators and provide all-out support to minimize the risk of administrative sanctions.
-
Communication with Stakeholders and Protection of Reputation: Aiming to minimize the impact of cybersecurity incidents on corporate credibility and brand value, our CIR Practice assists companies in developing and implementing strategic communication plans for their response to various stakeholders (e.g., customers and the public, the National Assembly, business partners, and the media), and designs response measures tailored to their needs, including customer support programs.
-
Response to Legal Disputes: Aiming to minimize the impact of cybersecurity incidents on corporate credibility and brand value, our CIR Practice assists companies in developing and implementing strategic communication plans for their response to various stakeholders (e.g., customers and the public, the National Assembly, business partners, and the media), and designs response measures tailored to their needs, including customer support programs.
Cyber Threat Detection Service
Our CIR Practice not only conducts standardized vulnerability diagnosis, but also identifies high-risk areas of IT systems through black-box based penetration tests that simulate actual hacker penetration routes. Further, the CIR Practice detects signs of potential targeted attacks and enables preemptive responses to such risks, through dark web-based threat monitoring of our clients’ brands, assets, and employee information. Through this technology-based detection system, we provide important insights not only for post-incident response methods, but also for the detection of potential attacks and establishment of containment strategies.
Establishment of a Resilience System
“There are only two types of companies: those that have been hacked, and those that don’t know they have been hacked.” As highlighted by this quote, in today’s world where cyberattacks occur frequently, it is essential for companies to identify risks early, respond quickly, and minimize damage. Hence, companies need a strong resilience system. Our CIR Practice designs security systems tailored to the characteristics of each client’s industry and organizational structure, and supports our clients’ efforts to strengthen resilience in the following areas:
-
Securing Visibility and Governance: The CIR Practice helps clients improve visibility of cyber risks throughout their organizations and establish internal governance systems and decision-making processes to enable their boards of directors or executive management to clearly recognize and manage security risks.
-
Simulation Training & Vulnerability Checks: The CIR Practice examines our clients’ security response capabilities and strengthens their actual response capabilities through white-hat hacker based penetration tests and cyber attack simulation training (table-top exercise) with the participation of their executive management.
-
Cyber Risk Assessment and Strategy Establishment: The CIR Practice identifies vulnerabilities in existing systems and operating environments, comprehensively analyzing legal, technical and operational risks that the clients may face, and suggests appropriate response strategies and priorities.
-
Compliance with Information Protection Requirements: The CIR Practice assists clients in establishing or maintaining policies, procedures, and organizational structure in accordance with cybersecurity and data privacy laws at home and abroad.
Key Experienceshow
- Assisted and represented a major distribution company in on-site investigations and criminal proceedings with respect to personal information leakage.
- Advised and represented a telecommunications carrier in administrative, civil, and criminal proceedings with respect to data breach cases.
- Advised and represented a large water purifier company in administrative and criminal proceedings with respect to a data breach case.
- Assisted and represented a medical information company overseas in on-site investigations and criminal proceedings with respect to the company’s data breach.
- Assisted a large online game studio in addressing legal requirements triggered by a cyber incident and represented such company in the subsequent criminal and administrative proceedings.
- Advised and represented a large internet portal company in its administrative, civil, and criminal proceedings with respect to a data breach/cyber incident case.
- Advised Japanese manufacturers in responding to cyber incidents.
- Assisted a capital company in responding to a cyber incident.
- Advised and represented an online auction and shopping website operator in civil proceedings stemming from data breach and hacking incidents.
- Represented a major Korean commercial bank in civil proceedings with regards to a data breach.
- Represented a large Korean game studio in a civil proceedings whereby the counterparty alleged unlawful use of personal information.
Related Expertise




