Articles

Results 1 to 5 of 15
Most popular |Most recent


Key questions to ask when preparing a data breach response plan (part II)

USA - May 16 2014 Many parts of an organization may be impacted – or may need to be at the table to respond to a data security incident or breach. Some, like the IT…

Key questions to ask when preparing a data breach response plan (part I)

USA - May 8 2014 As many companies have learned first-hand, data breaches and security incidents can arise at any time, and when they do, they can quickly consume an…

Time is money, managing time in a negotiation can really pay off

USA - March 25 2014 In today's global marketplace, Ben Franklin's observation that "time is money" is as true now as ever. Companies (large and small) feel tremendous…

White House releases voluntary guidelines for cybersecurity

USA - February 13 2014 The Framework contains three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. The Framework Core is a…

Aaron K. Tantleff, Chanley T. Howell, James R. Kalyvas, Michael R. Overly.

White House releases voluntary guidelines for cybersecurity

USA - February 13 2014 The Framework contains three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. The Framework Core is a…

Aaron K. Tantleff, Chanley T. Howell, James R. Kalyvas, Michael R. Overly.