Yes. I just asked that. For many, the response is likely “Yes! Of course we are! It’s *&^%$% cybersecurity – it’s complicated!” To which I would respond “Touché. It is…but it needn’t be overly complicated.” So, of course, I set out to find a complicated way to simplify it. And, in the spirit of National Cyber Security Awareness Month, I thought I would share two complicated ways to simplify your cybersecurity processes.
The Two-Track Process
It goes without saying that lawyers need to be involved in breach remediation. Best practices also suggest that lawyers need to be involved in cyber-security plan preparedness. That is a concept that is starting to take root in savvy companies proactively addressing cybersecurity. However, there is a new push suggesting that lawyers should be involved during the “continuous monitoring” phase, i.e., that “meat in the sandwich” portion of cybersecurity where day-to-day operations are ongoing and systems are being examined to ensure their integrity. That’s where I’d like to pause the conversation for a minute and focus our collective attention. For the full article click here
from cyber security caucus http://ift.tt/1S9dRho
via IFTTT
No comments:
Post a Comment