burger menu
Managing Enterprise Risks in a Digital World

Managing Enterprise Risks in a Digital World

    Add to bookmarks

Privacy, Cybersecurity, and Compliance Collide

SUMMARY

This study on security recommends companies as well to enable the multifactor authentication prior to moving to the cloud. Organizations should use a prioritized approach to detect the cloud resources staff is using and put them behind MFA.

It is not recommendable to only invest in enhancements and not consider practical threat assessments, the paper adds.  Organizations should use security risk assessments to design a plan to mature the security approach. 

This study on security recommends companies as well to enable the multifactor authentication prior to moving to the cloud. Organizations should use a prioritized approach to detect the cloud resources staff is using and put them behind MFA.

The report explains that simple issues still cause real problems – such as misconfigured cloud instances or servers with sensitive data indexed by search engines.

Regarding regulation, the report suggests companies to get ready for it. The majority of new laws are based on current laws and privacy and security principles.

A way to reduce risk is by raising awareness among employees and offer training on how to reply to a “phishy” request. This could be in the form of an email, text messages, social media messages, and phone calls/ voicemails.

Report download requires free registration on the publisher's website.

OUTLINE

Incident Response Trends

Compromise Response 

Incidents 

Timeline and Response Expectations

Key Decisions

Regulators 

Litigation

Minimizing Risk

 

DETAILS

Overview

Researchfinder Rating
5 out of 5 stars
Title
Managing Enterprise Risks in a Digital World
Sub-Title
Privacy, Cybersecurity, and Compliance Collide
Region
Global
Published
April 1, 2019
Publisher
BakerHostetler
Price
FREE
Language
ENGLISH

Content

Number of Pages
20
Number of Tables
0
Number of Exhibits
11
Topics
security
Tags
BakerHostetler, security, security software, software quality, software security
Methodology
This paper takes a look at the insights gained from working on over 750 incidents in 2018.
EVALUATION

This report shows how cyber security plays out in the trenches of real organizations and gives excellent guidelines for any organization that has to deal with the ever increasing cyber crime wave in a tight framework of regulation and compliance demands. 

Positives:

  • Clear key findings
  • Appealing design
  • Great graphics
  • Great content
  • Clear language
  • Excellent recommendations to minimize risk
  • Excellent recommendations to address risks

Similiar Reports

Internet Trends 2019

FREE

2019 Global eCommerce Fraud Management Report

FREE

Good Practices for Security of Internet of Things

FREE