There are several ways your business should protect itself from a cyber attack.  A panel of experts was assembled to discuss these issues from various angles:

  • TechnicalBruce Ward, VP of Business Strategy at Peters & Associates, discussed common security controls organizations employ to minimize risks from cyber-attacks.
  • LegalTodd Rowe, partner at Tressler, LLP, discussed Illinois state law and the need to conform to Illinois’ Personal Information Protection Act (PIPA).
  • FinancialMike Richmond, Risk Advisor from The Horton Group, discussed the costs involved with a typical breach and 1st and 3rd party coverage with various insurance coverage.

What did the experts say?

Several compelling statements and questions were addressed. A few of the highlights that were discussed:

  1. Todd discussed Illinois’ 2016 update to the Personal Information and Protection Act (PIPA) which went into effect in January 2017. In the law, Illinois organizations are chartered to “…implement and maintain reasonable security measures to protect those records from unauthorized access, acquisition, destruction, use, modification, or disclosure.”
  1. Mike stated that data IS your organization’s asset and it is not only logical to inventory your data, but also to quantify your organization’s data significance to gauge security measures required. $221 per record was the referenced yardstick.  Beyond the number, another $600+/record exists in reputational damage, contract reduction, and revenue loss.  How many records is your organization chartered to protect?  Bruce added that significant data can usually be found in the following locations:
   Human Resources – personnel files Research and Development – patents
   Operations – customer accounts, production IT – passwords, security architecture
   Financials – past / present / future reporting Third Party – outsourced vendors
  1. Bruce shared several stories on reasonable security controls in a modern infrastructure and a strategy to employ vCISO’s to outline a strategy to protect data.

Cyber Attack

For a free consultation with a security compliance professional, email info@peters.com. We are happy to help.

Take Your Security Strategy to The Next Level.

Download the Peters & Associates eBook-Defending Your Data.

Learn how to Secure Your Infrastructure, and Discover How to Defend Against Today’s Evolving Security Threats.

GET YOUR COPY

Not sure how secure you are compared to your peers?

Take our free Security Assessment to find out how you can improve your organization’s security posture.

START HERE