Creating a Data Loss Incident Plan - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20
Next Incident response planning-10 Next

Incident response planning

Data breaches are by nature interdisciplinary events that require coordinated strategies. Every functional group within an organization needs to be represented, including but not limited to information technology, information security, compliance or risk management, human resources, operations, legal, public relations, finance, and customer service. In addition, sales, business development, procurement and stockholder relations groups all should be included to fully anticipate the ramifications to business continuity.

As a first step organizations should appoint an executive, with defined responsibility and decision making authority with respect to data breach response. It is suggested this role be assigned to a Board member, corporate officer or high-level employee, as they could be required to provide Board briefings and need to be equipped with decision making authority. Combined with a project plan, every employee should know who is in charge, who to call and what to do.

The Online Trust Alliance (OTA) advocates that all businesses create an incident response plan and be prepared for the likelihood that they will experience a breach or data loss in the future. The fact is breaches happen and often at the worst of times. Rather than be lulled into the belief it will not happen to your business, a well-designed plan is emerging as an essential part of regulatory compliance, demonstrating that a firm or organization is willing to take reasonable steps to protect data from abuse. Doing so is good business. Developing a plan can help to minimize risk to consumers, business partners and stockholders, while increasing brand protection and the long-term viability of a business.

This slideshow highlights key questions and recommendations for businesses to consider while building a data loss incident plan.

More Slideshows:


10 Tips for Making Websites Stickier Develop an effective strategy to keep customers engaged.

The Mobile Work Force Today Mobile employees carry an average of 2.68 mobile devices, including laptops, smartphones and increasingly tablets.


10 New Smartphones for Business New smartphones for today's business user.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.