Wednesday, 28 October 2015

Are You Overcomplicating Your Cybersecurity Processes?

Yes. I just asked that.  For many, the response is likely “Yes!  Of course we are!  It’s *&^%$% cybersecurity – it’s complicated!”  To which I would respond “Touché.  It is…but it needn’t be overly complicated.”  So, of course, I set out to find a complicated way to simplify it.  And, in the spirit of National Cyber Security Awareness Month, I thought I would share two complicated ways to simplify your cybersecurity processes.

The Two-Track Process

It goes without saying that lawyers need to be involved in breach remediation.  Best practices also suggest that lawyers need to be involved in cyber-security plan preparedness.  That is a concept that is starting to take root in savvy companies proactively addressing cybersecurity.  However, there is a new push suggesting that lawyers should be involved during the “continuous monitoring” phase, i.e., that “meat in the sandwich” portion of cybersecurity where day-to-day operations are ongoing and systems are being examined to ensure their integrity.  That’s where I’d like to pause the conversation for a minute and focus our collective attention. For the full article click here



from cyber security caucus http://ift.tt/1S9dRho
via IFTTT

No comments:

Post a Comment