What We’re Reading - July 2021

Mintz - Privacy & Cybersecurity Viewpoints
Contact

Mintz - Privacy & Cybersecurity Viewpoints

There is a glut of information out there regarding privacy and cybersecurity these days. Our new feature “What We’re Reading” provides a curated list of articles, blogs, newsletters, and books that you may find interesting and helpful.

Return to Office Planning – Getting Corporate Data Back

There was a rapid shift of vast amounts of proprietary data from inside corporate walls to home PCs, Dropbox accounts, and Google Drives over the past 15 months with WFH, and now, reported increases in employee mobility exacerbates the potential problem of corporate trade secret and other confidential information exfiltration. Companies should be considering data governance and recovery as part of any return-to-office plans. ComputerWorld – You can’t take it with you: Stop data exfiltration now

Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) Releases Ransomware Assessment Tool

CISA has released a new module in its Cyber Security Evaluation Tool (CSET): the Ransomware Readiness Assessment (RRA). CSET is a desktop software tool that guides network defenders through a step-by-step process to evaluate their cybersecurity practices on their networks. CSET—applicable to both information technology (IT) and industrial control system (ICS) networks—enables users to perform a comprehensive evaluation of their cybersecurity posture using many recognized government and industry standards and recommendations. The RRA is a self-assessment tool based on a tiered set of practices to help organizations better assess how well they are equipped to defend and recover from a ransomware incident. CISA has tailored the RRA to varying levels of ransomware threat readiness to make it useful to all organizations regardless of their current cybersecurity maturity. Get the RRA here.

Addressing Third-Party Cyber Risk

Third-party cyber risk is rising to the forefront and requires attention in cybersecurity programs and hygiene. The risk presented by third-parties ultimately ends up at your company’s door. FTI Cybersecurity partnered with Harvard Business Review Analytic Services to produce a report analyzing how to address this risk. The report is available here. (free registration required)

Beach Reading

Just in time for the holiday weekend: Nicole Perlroth, cybersecurity reporter for the New York Times, has written a page-turner from her decade-long journey covering cybersecurity. The book, This is How They Tell Me the World Ends, documents the secretive, invisible, government-backed cyber threat market, and takes a first look at a new kind of global warfare. The book was published before Colonial Pipeline, but is an even more riveting read post-Colonial Pipeline. You may think you’ve picked up a John LeCarre novel ….. but this is for real.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Mintz - Privacy & Cybersecurity Viewpoints | Attorney Advertising

Written by:

Mintz - Privacy & Cybersecurity Viewpoints
Contact
more
less

Mintz - Privacy & Cybersecurity Viewpoints on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.