In This Presentation:
- Overview of data breach landscape
- Data breach response
..Technical best practices
..Legal best practices
- Data breach prevention
..Technical best practices
..Legal best practices
- Excerpt from Overview of data breach landscape:
..Attacks continued at a high level
..Cyber-espionage is understood to be an established tool, but hard to determine real volumes, since if you do it right, no one knows you’ve done it!
..A high percentage of the attacks were ultimately preventable
..While some attacks are very high tech, low tech attacks are very popular and often successful
..Perpetrators know this and exploit human weaknesses
Please see full publication below for more information.