Elevating Security Awareness

Increasing the Relevance and Scalability of End-User Education

Topics: Information Technology, Information Security, IT Governance, Data Management

Airbrush the Rapid-Response Playbook

Nearly all institutions have conducted basic preparation in segmenting data and assigning ownership over key systems; however, few have made key roles and processes part of their breach response plan. Designating breach response leaders, creating distributed application whitelists, and tracking time to response can help even advanced organizations improve the efficiency and effectiveness of breach response.

Worst of Both Worlds

Practice 1: Incident Managers