Why Information Security Need to be Empowered to Manage Data Breaches

Manage Data Breaches

2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of those breaches and questionable actions that have occurred in between when a data breach has occurred and when it’s been reported.  Those questionable actions have included company executives selling stock and paying hackers a ransom.  Sometimes data breaches have also been reported by independent bloggers before the businesses officially reported them as was the case with both Target and Nieman Marcus.  And, despite the delayed reporting of many data breaches, businesses have still needed to update the public on a bigger than initially reported scope of breach.

Manage Data Breaches

A breach investigation can typically take weeks or even months before most businesses feel they know enough to disclose. In the past, businesses have typically concerned themselves with fixing the security vulnerability or issue from which the breach arose and then worrying about reporting.  Previously, regulation in Europe and in the United States with its patchwork of state laws gave companies leeway on times to report, with only a handful of states requiring notice within 45 days, and even then, with some exceptions.

Shifts in Regulatory Landscape around Data Breaches

A measure was recently introduced in the United States Congress that could impose new criminal penalties on anyone convicted of “intentionally and willfully” concealing a data breach, including fines and up to five years imprisonment, or both. The much-hyped General Data Protection Regulation (GDPR) that was enforced on May 25 specifies that the supervisory authority must be notified of a breach within 72 hours of its discovery and failure to do so could carry hefty consequences of up to up to 4% of annual global turnover or €20 Million.

Empowering Security Teams to Become Collaborative Across the Organization

As the regulatory landscape becomes more complex, security teams will have to step up as will company executives. It will require businesses to have much more than a plan in place and to be able to assemble what has occurred with immediacy if they are to disclose quickly and without incurring other areas of liability.  Businesses need to have an automated way to obtain a “single source of truth” that draws feeds from security tools, social media and other company collaboration tools for a complete view of breach-related activity.

The picture that is emerging for security teams is that data breaches need to be elevated to a business level immediately and in a way that limits potential complications surrounding the breach.  Without tooling for collaborative and secured communications businesses will face enormous legal and regulatory challenges not to mention reputation and business continuity issues as they struggle to fulfill disclosure obligations.

By Evelyn de Souza

Staeadfast

Episode 5: How the Pandemic is Changing Business and the Cloud

An Interview with Ed Dryer of Steadfast With the global pandemic wreaking havoc on business and society, everything is changing. Ed Dryer, Senior Technology Strategist at Steadfast Networks, which specializes in Colocation, Managed Infrastructure as ...
Kyle Bernard Author

FlightHub and JustFly on Facial Recognition Technology, Travel and Privacy

Facial Recognition Technology For years facial recognition technology only existed in science books, television and cinema. The idea was brilliant. However, real-world technology hadn’t yet caught up with the concept. That’s changed in recent years ...
Gary Taylor

5 Reasons Why Virtual Desktop Infrastructure Will Go Mainstream Post 2020

Virtual Desktop Infrastructure Growth Virtual Desktop Infrastructure (VDI) technology enables remote users to access their desktop from anywhere using an internet connection. This technology has been around for a couple of decades but never received ...
Martin Mendelsohn

New Executive Roles in the Post-Corona Era

Executive Roles in the Post-Corona Era As the global economy shows early signs of reviving from past months of rigormortis, forward-looking companies will be busy preparing for the next pandemic. What this means for technology ...
Atman Rathod

How APIs and Machine Learning are Evolving? 

Machine Learning Continues to Make API Development Better  For any developer, API or Application Programming Interfaces come as the helpful components to add valuable features and functionalities with the app they develop. API in many ...
Gary Bernstein

Mapping Crime Though Big Data – Leading Sources

Online Crime Maps Online crime maps is a set of tools used by law enforcement agencies to map and make an analysis of crimes and incidents in order to find possible patterns in them. Online ...