The cybersecurity threat is real ... so commit

Shipchandler, Shamoil T.; Riley, Rachel M.
June 2015
Inside Counsel (SyndiGate Media Inc.);6/8/2015, p7
The article discusses the need for law firms to be committed in their efforts intensify their cybersecurity measures. Topics discussed include cybersecurity risks affecting every industry including schools, the government and the retail industry, reasons behind groups' cyberterrorism efforts including political gain and criminal gains and the first things a company or organization should take to establish a proper cybersecurity scheme.


Related Articles

  • Managing the risk of IoT. Sorebo, Gib // Control Engineering;Sep2015, Vol. 62 Issue 9, p33 

    The article presents six ways to effectively manage security risks that comes with the use of the Internet of Things (IoT), which includes identifying existing IoT implementations in place, planned or anticipated, adopting security policies or procedures related to IoT and participating in...

  • THE NEW REALITY OF CYBERSECURITY. Tuttle, Hilary // Risk Management (00355593);Oct2015, Vol. 62 Issue 8, p21 

    The article focuses on steps in developing a cybersecurity strategy to protect company assets from digital invasion. Topics include assessing a company's cybersecurity through its policies, procedures, training and risk management, acquiring the services of an insurer, and having a robust,...

  • Helping the C-Suite Assess Cyberrisk. Dennis, Patrick // Risk Management (00355593);Oct2015, Vol. 62 Issue 8, p28 

    The article focuses on 5 steps to help company executives more effectively assess and communicate cyberrisks. Topics include educating the executive team on cyberisks including less sensational but more likely exposures, establishing that cyber risk management is a company-wide responsibility...

  • Vast Majority Of Companies Not Covered For Cyber Attack.  // National Underwriter / P&C;5/16/2011, Vol. 115 Issue 18, p12 

    In this article, the author discusses the management of issues involving cyber attacks in companies. The author mentions the significance of investing on network-liability policies in ensuring the security of a company. He also mentions insights of some notable people regarding the issue such as...

  • SAFEGUARDING CUSTOMER DATA. PYZIK, KENNETH // Internal Auditor;Oct2014, Vol. 71 Issue 5, p22 

    The article discusses strategies on protecting against cyber breaches, which affected the business of eBay, Home Depot and Target in 2014 after hackers were able to obtain their customers' data. Topics discussed include the three states of personally identifiable information (PII), aspects...

  • PRIVACY Risk Management. Chaudhary, Raj; Lucas, Michael // Internal Auditor;Oct2014, Vol. 71 Issue 5, p37 

    The article focuses on the role of internal auditing in protecting a company's confidential data against cyber breaches, which according to the report "2014 Cost of Data Breach Study" cost a U.S. company 5.9 million U.S. dollars in 2013. Topics discussed include The American Institute of...

  • Mapping to the NIST Cybersecurity Framework. Durbin, Steve // CIO Insight;10/8/2014, p1 

    The article focuses on the advantages offered by the National Institute of Standards and Technology (NIST) Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity on business enterprises developing a cyber-risk strategy. Topics discussed include the importance of risk...

  • How Midsize Companies Put Large Companies at Risk. Frenkel, Karen A. // CIO Insight;9/21/2015, p2 

    The article presents information on the risks faced by large companies from midsize companies including cyber attacks, offering timely customer support and gap in deployment of malware solutions.

  • in case of cyberattack. Richey, Erin // ENR: Engineering News-Record;3/2/2015, Vol. 274 Issue 6, p33 

    The article presents strategies on addressing a cyberattack, including strictly following the company's plan, knowing if the firm has a cyberrisk insurance and having a threat dedicated response team.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics