Skip to content

Wotton + Kearney Speeds Up Data Breach PII Review by 15%

WK logo-600x200
Wotton + Kearney logo

"Canopy gives us the ability to target PII with precision, which is the single most effective way to focus our review team’s efforts and keep costs low."

Kieran Doyle
Head of Cyber, Privacy and Tech Liability | Wotton + Kearney

The Challenge

An Australia-based financial advisory and accounting business suffered a credential compromise, affecting several mailboxes (PSTs) and endangering sensitive financial information. The company’s cyber insurer enlisted Wotton + Kearney’s Cyber Forensics Service for breach response.

The Solution

Seeing a real need to be able to more quickly assess the nature of breaches and help organizations meet non-negotiable notification deadlines, all while managing the cost of cyber claims for insureds and insurance partners, W+K chose Canopy's Data Breach Response software as the right tool for the job.

WK logo-reverse-600x200

"When it comes to batching, reviewing spreadsheets, and linking compromised PII to people, other tools simply cannot compare."

Jorge Nicholas
Associate | Wotton + Kearney

The Result

  • Detected 15 categories of PII, including high-risk data like bank account numbers
  • Streamlined document grouping & batching process
  • Transformed PII Review process into an accept/reject workflow, eliminating the need to copy-and-paste data into spreadsheets
  • Imported data from spreadsheets in seconds, taking the pain out of dealing with Excel files
  • Clearly displayed linked PII and people together in the Entity Panel
  • Sped up PII Review by 15%

Unparalleled Processing Power & Speed

data upload icon

76.77 GB

size of compromised PSTs

document icon


documents in the PSTs

magnifying glass with checkmark icon


categories of PII detected

Get These Results for Your Data Breach Response

Request your personalized demo to see how Canopy's AI-powered solution can transform your workflow.