Enterprise Security Announcements
"Quick announcement, ITProTV has updated their course library with new courses. Upcoming courses include Cybersecurity Analyst+, CCNA Cyber Ops, ITIL Operational Support and Analysis, Penetration Testing, Ethical Hacking v9. ITProTV is introducing a new membership level. All current Premium Members will be granted the highest membership level available, so sign up today! Visit itpro.tv/enterprisesecurity and use code ES30."
Enterprise Security News
- HP Debuts New Devices In Las Vegas - BizPlus
- FireMon Announces Future Support for Check Point R80 - FireMon
- Bitdefenders second Bitdefender Box sniffs your homes network to detect hackers | PCWorld
- BRIEF-Clearlake Capital to buy LANDESK | Reuters
- CIO-Asia - CIOs will thwart cybersecurity threats with behavioral analytics in 2017
- NGINX Gains in Netcraft December Web Server Survey
Technical Applications: Cyber Insurance
- Let’s talk insurance… what it is, what it isn’t
- Let’s talk about underwriting - and how that’s going to be weird for a while
- And in your organization, are you even part of the conversation?
- Should you be?
- What are you covering, really?
- Do you know the top claims last year?
- How are they assessing you (think: third party risk)
- What is reasonable? And are you meeting those standards?
- We have little settled case law here - for good reasons
And then we can go deeper
- Who should get cyber insurance?
- common coverage for all businesses, with the condition that premiums reflect actual risks. Small organizations making less than $1M in annual revenue have a higher percentage of being hacked
- What are the risks that can be covered by a Cyber Liability Insurance Cover [CLIC]?
- data breach crisis management expenses covering: incident, the investigation, the remediation, data subject notification, call management, credit checking for affected users, legal costs and regulatory fines.
- How to make sure that you have the right coverage with the right insurer
- make sure to understand the insurance policy jargon such as: “hackers”, “attacks” or “incidents” and “breach”
- 5 Questions for your Potential Insurer
- Which devices must be encrypted? What about the data that is in the control of third-party service providers?
- What support is included in case of a data breach event?
- Are cyber incidents resulting from employees’ errors, negligence or maliciousness covered?
- What happens if an intrusion is detected at a later time?
- In which circumstances will a claim be refused based on the principles that insurance policies often stipulate that an organization must not be breaking the law?