Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Data Breach Report in Capital One Litigation Not Privileged

By Jeffrey Heuer
cyber6-900px.jpg
June 5, 2020

On May 26, the District Court found in the In Re: Capital One Consumer Data Security Breach Litigation, MDL No. 1:19md2915 (AJT/JFA)(ED VA) that a report prepared by Mandiant concerning the Capital One data breach (Breach Report) was not protected by the work product privilege and must be turned over to Plaintiffs.

The Breach Report was prepared by Mandiant at the direction of Debevoise & Plimpton, Capital One’s counsel. Debevoise & Plimpton hired Mandiant immediately after the breach to assist in likely litigation. On July 24, 2019, Debevoise & Plimpton and Capital One entered into an agreement with Mandiant to provide advice “concerning security incident response; digital forensics, log and malware analysis; and incident remediation” (7/24/19 Agreement). Additional duties were added on July 26.

In July 2019, Capital One reported the breach and lawsuits started to be filed the following day. Mandiant performed the work and prepared the Breach Report in September 2019. So far this looks like the normal way experts are hired under the very real prospect of litigation for which the work product doctrine should attach. But as so many TV offers remind us “wait, wait, there’s more!”

The Court acknowledged when Mandiant was hired “there was a very real potential that Capital One would be facing substantial claims.” The Court found the determinative issue was whether the Mandiant Breach Report would have been prepared in substantially similar form “but for the prospect of that litigation.” The fact that the investigation was done at the direction of outside counsel and the Breach Report was initially provided to outside counsel did not satisfy the “but for” test.

Capital One failed to demonstrate Mandiant would not have performed substantially similar services in the absence of litigation. In fact, Mandiant had a long-standing relationship with Capital One, going back to at least 2015, to perform essentially the same services as detailed in the 7/24/19 Agreement (and the prior agreements were specifically mentioned in the 7/24/19 Agreement). The only significant change from prior agreements were that Debevoise & Plimpton would direct the work and receive the Breach Report. Mandiant’s similar, prior work was deemed business critical and not a legal expense. The Breach Report was shared with four regulators. While the Court noted this did not necessarily constitute a waiver, it did not decide the case based on this factor and noted the “waiver argument may have some merit.” The Court further noted the full Breach Report was shared somewhat freely within Capital One – with the Incident Response Team, in preparation of SOX reports and in publicly announcing the breach.

Folks working in this space are well aware of the similar issue in the Experian data breach case. In Experian, Mandiant’s report was afforded the work product privilege. The Court distinguished this case from Experian. Key distinguishing factors from Experian included the full report was not provided to the incident response team or other non-legal needs, and there was no preexisting relationship with Mandiant to the same extent as in Capital One. Accordingly, the Court ordered the Breach Report turned over to Plaintiffs.

Some clear lessons can be gleaned. When choosing a company to assist with data breach litigation response, clearly vet that company. Past work for the breached company, including prior work relationships and contracts, should be reviewed carefully to make sure the post-breach engagement is not more of or similar to the same. If in doubt, have one firm assist with litigation and the other in breach mitigation.

Be careful about who sees the full litigation report and the purpose(s) for which it is used. Stay in the work product lane. Again, hiring two firms with distinct functions – one for mitigation (which can also be used more broadly internally and with regulators), one for litigation – makes this task easier especially when the breaches are so large.

KEYWORDS: cyber security data breach forensic security incident response information security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Heuer jeffrey

Jeffrey Heuer is a St. Louis-based partner with the law firm Husch Blackwell LLP where he counsels financial services companies in the Code of Federal Regulations’ (CFR) “alphabet soup,” new product development and review, and consumer lending programs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Been Hacked? Let That Be a Lesson to You

    Capital One to Hand Over Mandiant's Forensic Data Breach Report

    See More
  • hacker- enews

    Capital One Announces Data Breach Affecting 100 Million Customers

    See More
  • data breach

    Hacker Responsible for Capital One Data Breach Hacked More Than 30 Companies

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing