Due to exponential data growth and organizational expansion, regardless of industry sector, the challenge of identifying, protecting and managing information assets has multiplied for IT security, legal, privacy and records management professionals. As many of the largest global networks have been penetrated, new regulations have been developed across the U.S. and internationally. However, continued high-profile attacks, such as SolarWinds and Accellion, prove all networks are vulnerable and underscore that organizations must have “reasonable security” protecting personal data (PII/PCI/PHI).

COVID-induced remote work continues to disrupt normal IT security operations, exposing unknown vulnerabilities that malicious actors prey upon and profit from. When facing a high-profile cyber incident of compromised PII impacting consumers around the world, organizations must act with expediency and precision to understand what personal information from customers, business partners and employees may have been exposed. Expediency is a significant challenge given widely-dispersed data sources lacking centralized controls and limited internal resources.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]