If you’re drowning in a sea of fast-changing, complex information about data security, you are in good company. It seems that every day new and modified threat methods and vectors appear; another vendor knocks on your door pitching a product or solution as the latest digital security panacea; a customer or vendor (or both) tries to shift data security risks to you; a new law is passed in a state, province, country or region that, once again, tightens the noose by adding legal obligations; and your executive team or board asks for an update on the organization’s . . .
From the Spring 2017 Issue
Engineering and Vulnerability Management
10 Steps to Risk Management: Compliance and Risk Mitigation in a Sea of Data Security Risk
Keith Moulsdale
Co-Chair, Cybersecurity, Data Management & Privacy Group | Whiteford, Taylor & Preston LLP

Leave a Comment