RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Reply To:
Records Management Program <[log in to unmask]>
Date:
Fri, 15 Jan 2016 08:11:51 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (31 lines)
When a data breach hits a company, it delivers a healthy dose of stress,
panic and urgency — and it's just about the worst environment for an
incident response team to put its procedures into action for the first
time. But GCs can help their organizations conduct a cybersecurity
simulation to ensure that when the real one arrives, everyone's ready.

****
"In defending a breached organization, I absolutely would prefer to defend
an organization that has done an annual incident response exercise to
defending one that has not," says Lori Nugent, a shareholder at Greenberg
Traurig LLP.

http://bit.ly/1RKqVgg
http://bit.ly/1RKqVgg+

-- 
Peterk
Dallas, Tx
[log in to unmask]
Save our in-boxes! http://emailcharter.org
"The problems of our economy have occurred not as an outgrowth of
laissez-faire, unbridled competition.
They have occurred under the guidance of federal agencies, and under the
umbrella of federal regulations."
Senator Ted Kennedy, in defending trucking deregulation in 1978.

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2