Quick: Where do you go to find the cost-per-record of a data breach? Reports from the Ponemon Institute? The annual Verizon Data Breach Investigations Report? How about the NetDiligence Cyber Claims Study? These are all credible and popular sources for breach cost benchmarking, but they give drastically different answers to the question.
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discusses DoCRA – Duty of Care Risk Analysis.
Information Technology (IT) / Operations Technology (OT) Convergence Security industry leaders from around the world regularly submit applications to speak at the annual RSA Security Conference which takes place this coming February. RSA reviews the more than 2,400 responses they receive to not only select speakers for the conference, but also identify key trends that […]
As we have outlined in prior articles, states such as California, Colorado, and New York are actively implementing regulations that will enforce compliance regulations concerning the management of personal information with reasonable security. Like cybersecurity itself, legislation is a dynamic process and states continue to tweak and add amendments to the existing laws.
NYCRR 500 New York City is often referred to as the financial capital of the world; with the state of cybersecurity today and the increasing barrage of threats that financial related institutions must combat on a daily basis, it is no wonder that New York became the first state to take government action to do something […]
Cybersecurity is a major concern for all organizations today that utilize digital technology, but one of the initial questions for any organization must be, “What are my legal obligations when it comes to cybersecurity?”
HALOCK partner Chris Cronin will be moderating a NetDiligence® Cyber Risk Summit panel on reasonable security. The panel includes industry experts on risk based analysis process and legal, regulatory and security best practices. Attend the event to learn how to best establish ‘duty of care’ for cybersecurity.