Blog | G5 Cyber Security

Effective Breach Response

The key to effective breach response is to not take a one-size-fits-all approach, says Ronald Raether. Raether also encourages being proactive with regulators and reaching out early. The fourth installment of the five-part Legal Roundtable series focuses on the most significant breaches of 2012. The remaining installments of this series focus on: The Top Breaches of 2012; which breached entities responded best and worst; Lessons we can carry into 2013. The lessons we can learn are that even when you meet certain requirements – in terms of standards – you’re still susceptible to breaches.”]

Source: https://www.cuinfosecurity.com/effective-breach-response-a-5456

Exit mobile version