Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
At a recent CIO panel, an audience member asked the three of us on stage: “What do you see as your number one priority in the coming 12 months?” It was my turn to go first, and I responded “cybersecurity” without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management, which is much more comprehensive and includes as a subset cyber threats and cyber risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.
While some time-tested risk management concepts and strategies may be exactly the right approach for dealing with cyber risk, relegating it to a subset of anything speaks to a lack of understanding of the problem and will ultimately increase risk significantly. The rapid pace of increasing complexity and the increasingly crippling impacts of cyber-specific threats demand a different degree of prioritization, resources and tireless attention than any other type of risk corporations face today. In the same way that technology will change the way we do business more in the next five years than any other catalyst, cyber risks will challenge our ability to operate more than any other threat.
It is against that backdrop that governments and large enterprises have continued to harden their defenses and small to mid-sized businesses (SMBs) have lagged behind due to lack of resources or lack of motivation to mitigate risk. The prohibitive cost of comprehensive prevention measures and the frightening cost of breach response may lead many smaller companies to oversimplify the problem or to put their head in the sand hoping that no hackers pick on them. While that may have been a safe bet a few years ago, it's becoming increasingly likely that being small doesn't keep you off the target list. According to Symantec's 2016 Internet Security Report, 43% of cyber-attacks target businesses with 1 to 250 employees ' two and a half times the share attributed to that segment four years ago ' making SMBs a growing sweet spot for bad actors.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.