Breach Response Strategies: What's Missing?
- Premium Members Only Content - Exclusive Video -
See Also: 2016 IAM Research: Where Financial Institutions' PAM Programs Are Falling Short
Most organizations today have breach response plans. But far too few test these plans before an incident occurs. Experts Michael Breummer and Ronald Raether discuss the essentials of breach response.
Testing a plan is just one necessary element. Communication with all stakeholders is also commonly overlooked.
In a video interview about breach response strategies, Bruemmer and Raether discuss:
- Essential elements of a breach response plan;
- The emerging role of the cyber insurer;
- Key technologies and the roles they play.
It could be a distributed-denial-of-service attack against your organization, a breach of one of your third-party vendors, or perhaps one of your trusted employees has lost or had stolen a mobile device containing personally identifiable information.
Whatever the scenario, data breaches are increasingly common for organizations in all industries.
And while technology solutions for breach detection are growing more sophisticated, the strategic elements of breach response are not keeping pace, experts say.
Too often, breach response plans are left untested - until there is an incident. Often the strategies are not even communicated to all the stakeholders who need to be a part of the plan. That, or the plans fail to account for critical third-party vendors and their roles.
In this exclusive video interview, two prominent breach response experts discuss what's missing in today's breach response strategies. Michael Bruemmer of Experian Data Breach Resolution talks about the lapses he commonly sees after real-world incidents. And attorney Ronald Raether covers the legal aspects that are most often overlooked.
You might also be interested in …