Cyber Data Risk Managers released a "2014 Data Privacy, Information Security and Cyber Insurance Trends Report" in Coordination with and in Support of Data Privacy Day
Princeton, NJ (PRWEB) January 27, 2014 -- Cyber Data Risk Managers is a specialist U.S. insurance broker focused exclusively on cyber/data breach and intellectual property insurance that seeks to connect businesses and public and private organizations of all sizes, industries and sectors, as well as industry experts in the area of Data Privacy and Information Security with effective insurance solutions to help mitigate cyber risk, data breach and intellectual property risks.
Today, more than ever businesses and organizations need to stay one step ahead of online attackers and other malicious actors. There’s ample evidence all around us that proves adversaries are coming up with new and much more sophisticated methods for distributing malware, while remaining undetected for long periods and stealing sensitive customer data, intellectual property or disrupting critical systems.
This 3rd annual Cyber Data Risk Managers 2014 report, released on Data Privacy Day January 28, 2014 shows our commitment to data privacy and our continued support to help empower businesses and organizations to make the protection of privacy and data a great priority in their environments. Included in this report, are many invaluable insights and recommendations offered by Data Privacy and Information Security industry experts that will prove useful for businesses and organizations, regardless of industry or sector.
Insights and recommendations discussed include:
-- Buying Cyber Insurance and Intellectual Property Protection in Today’s Rapidly Evolving Threat Environment by Christine Marciano, President/CEO, Cyber Data Risk Managers
-- Understanding the 2014 Threats, Risks and Importance of Incident Response
by JD Sherry, Vice President, Technology & Solutions, Trend Micro
-- The Often Forgotten About Data Breach Weak Spot: Disposal of IT Equipment
by Judy Selby, Partner, Baker Hotelster
-- Inadequate Protection of Sensitive Data has Increasingly Expensive Consequences, Several Tips to Consider by Barry Schrager, President, XBridge Systems
-- Ad Hoc Incident Response isn't Enough Anymore
by Bruce Schneier, Cyber Security Technologist, Author, CTO, Co3 Systems
-- Massive Target Breach Highlights the Importance of Changing to a Chip-Enabled POS System and 2014 is the Year InfoSec Professionals take a Closer Look at All Things Bitcoin
by Richard Santalesa, Member, SmartedgeLaw Group
-- Remember that public WiFi networks are not protected. In 2014, make sure you use a VPN for security
by Kent Lawson, CEO, Private Wifi
-- 2014: The Year New Privacy Risks and Data Breaches Arise Due to Evolving Internet of Things, Big Data, Mobile Apps and Wearable Computing Device Risks
by Rebecca Herold, CEO, The Privacy Professor
-- Data Breaches will continue to dominate the Headlines in 2014 and Organizations must ensure their Security Efforts Measure Up to Specific Control Standards or else Face the Consequences
by Anthony M. Freed, Community Engagement Coordinator, TripWire
-- Data Breaches are a Fact of Life in the Digital Age and Organizations will Increasingly be under Pressure by Customers and Governments to become more immune to Cyber Attacks
by Michael Fertik, CEO, Reputation.com
-- In 2014, The Voice of the Customer Will Drive Organizations to Reprioritize their Security and Data Privacy Measures or Else Lose their Customer’s Business
by Jack Danahy, CEO, Danahy Advisors LLC
-- Simply put, 2014 is the Year to Get Back to Basics and Build a Strong Data Privacy and Security Program by Shaun Dakin, CEO, Dakin Associates and the Privacy Camp
-- Why Understanding a Breach Victim’s Mindset is Key to a Successful Data Breach Resolution Plan by Michael Bruemmer, Vice President, Data Breach Resolution, Experian
-- Five Questions for Senior Leadership to Consider on How to bring IT, Physical and Human Security together under a true Information Security Governance Program
by Andy Bochman, CEO, Bochman Advisors
-- Listing of Key Information Security Areas that Must be Assessed at Least Annually
by Ronald Beltz, Vice President, Loricca
Christine Marciano, Cyber Data Risk Managers LLC, http://htttp://www.DataPrivacyInsurance.com, 855-288-7475, [email protected]
Share this article