Practical steps to address cybersecurity threats—what you should do when heightened tension in the Middle East or other events increase the threat of cybersecurity incidents.
- When news events or business initiatives turn...more
1/24/2020
/ Best Practices ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Information Technology ,
Policies and Procedures ,
Popular ,
Risk Mitigation ,
SHIELD Act
On May 11th, in the wake of a series of wide-ranging cyber breaches and attacks plaguing public and private sectors alike, President Trump signed a long-awaited Executive Order on Strengthening the Cybersecurity of Federal...more
6/2/2017
/ Critical Infrastructure Sectors ,
Cybersecurity Framework ,
Data Protection ,
Executive Orders ,
Hackers ,
Information Technology ,
National Security ,
NIST ,
Popular ,
Risk Management ,
Trump Administration
Given the range of threats and the catastrophic impact an attack could have on an airline, strategizing to reduce the risk of breaches and implementing plans to deal with them once they occur should be prioritized at board...more