Navigating Misaligned Law Enforcement and Company Interests in Data Breach Investigations

Read Kim Peretti and Justin Hemmings’ article about navigating misaligned law enforcement and company interests in data breach investigations on Lawfare Blog : The ubiquity of data breaches can create a misperception that data breach investigations are routine. In reality, these investigations can be surprisingly complex and are unlike other law enforcement investigations. Most significantly, […]

Four best practices in responding to a security breach

From Tesco’s cyberheist to the attacks carried out over Swift’s system, it’s clear the financial industry is a gold mine for cybercriminals – there’s been a 40% increase in cybercrimes targeting the financial sector over the past year despite improved risk management. Read about the four best practices to respond to a data breach according […]

Why a data breach response plan is critical to SMEs

Read  Jim Steven explain why small and medium businesses should have a good data breach response plan on SME Web : You don’t see it coming, you may never know who’s behind it or exactly how badly you’ve been affected… until it’s far too late. UK SMEs are under threat from data breaches, and this […]

U.S. Promotes Risk-Based Data Breach Response Model

The exiting Obama administration has embraced a risk-based approach to data breach preparation and mitigation for federal agencies in an Office of Management and Budget memorandum, cybersecurity professionals told Bloomberg BNA. Read more about the risk-based data breach response model being put forward by President Obama on Bloomberg BNA.

Why a data breach response plan is critical to SMEs

Read why Jim Steven says that a data breach response plan is necessary for small and medium enterprises on SME Web : You don’t see it coming, you may never know who’s behind it or exactly how badly you’ve been affected… until it’s far too late. UK SMEs are under threat from data breaches, and […]

Appointing a Cyber Point Person to Minimize Impact of the Inevitable

Read why says that companies should appoint a cyber point person to minimize the impact of inevitable data breach on New York Law Journal : As information has become an increasingly valuable commodity for all businesses, it has also become extremely valuable for hackers and criminal organizations. The tools that the bad actors are using […]

Haiyan Song: Organizations will Integrate Machine Learning Tech to Automate Data Breach Response

Haiyan Song, Splunk vice president of security markets, said more organizations will adopt adaptive response, behavioral analytics and machine learning strategies to automate response, retrieval and sharing in multivendor environments. Read why Haiyan Song of Splunk says that organisations will integrate machine learning in their data breach response plans in future on Executive Biz.

Are You Prepared for a Data Breach?

Read why Gary Audin says that is necessary for every company to prepare for an inevitable data breach on No Jitter : With the threat environment constantly changing, your data breach response plan will always be a step behind new malicious tactics. You are going to have a data breach. You may or may not know it, […]

Data Breach Preparation and Response: Breaches are Certain, Impact is Not

The concept of the Window of Compromise was first introduced in the “Introduction” section to this chapter and will serve as the primary focus of the remainder of this chapter. Read the excerpt from Data Breach Preparation and Response: Breaches are Certain, Impact is Not by author Kevvie Fowler in which the author gives suggestions […]

Make companies pay full cost of breaches to restore trust in the internet, says ISOC

Fake news, online banking thefts and data breaches: It’s no wonder that trust in the internet is at an all-time low. But don’t worry: The Internet Society has a five-step plan for restoring faith in the network of networks. Read more about the five steps through which companies can restore full trust after data breach […]