Michael Petrov is presenting a three-day virtual seminar/workshop: “Cybersecurity Standards Versus Hackers and Government” through ISACA New York Metropolitan Chapter.
This three day course covers the basics of cybersecurity standards and frameworks. Designed for I.T. and Cybersecurity Professionals, topics include: standards, methodology, review, and audit techniques, implementations and operations of cybersecurity standards.
“Private Cybersecurity Lawsuits”
Question: What liability do we have to individuals in a private lawsuit if there is a data breach?
A company can be privately liable to an individual or individuals in a number of ways deriving ultimately from “common law” court made laws, or “statutes” enacted by Federal or State legislatures.
Federal Class Actions for Data Breach – Who Can Sue?
Suing due to a data breach related incident might not be as simple as you'd think.
There are fine terms you must meet in order to be able to sue and for your case to be approved in court.
Our VP of Compliance lays out everything you need to know on this subject.
FISMA is the Federal Information Security Management Act. It is a high-level law that mandates a level of cybersecurity for all federal agencies and federal contractors. It was enacted by Congress in 2002 and updated in 2014.
While FISMA delegates cybersecurity responsibility to the various federal departments and agencies, it also centralizes a significant amount of cybersecurity functions (including mandates) to the Department of Homeland Security (DHS) and leaves the nitty-gritty standards and guidelines to the National Institute of Standards and Technology (NIST) to hammer out.
On 4/10/2015, Digital Edge published an article discussing the topic of polymeric downloader viruses. It included resources for free antivirus and antimalware. As viruses are still very prevalent in the cyber world, the Digital Edge team has felt it was necessary to update the community on the resources that can offer protection.
To learn more about free products helping you to protect your computers, networks, and infrastructure components from attacks, malware, viruses, and other cyber pests, please read the latest article here.
In this cyber environment, it is important to have a robust Information Security Management System (ISMS), but how do you know if you have a strong ISMS?
Well it's as simple as filling out a questionnaire!