In this webinar Professor Bart Preneel (COSIC-imec-KUL) presents how D3-PT as foundation of contact tracing apps instills trust in users and allows for cross-border interoperability.
Cyber Talk: After the hack – be prepared with this First Aid legal toolkit – 18 June 2020
18 June 2020 – Cyber Security Coalition
The Cyber Security Coalition, in collaboration with VBO/FEB and Agoria, kicked off a new series of ‘Cyber talks’ with a presentation on legal responses and consequences after a hack, by Catherine Van De Heyning (Artes, Antwerp). And a hack is a matter of ‘when’, not ‘if’, so be prepared. Not only plan for the necessary technical/ICT reaction, but also prepare in advance the legal, communication and business continuity response actions. And do test those plans, considering an increasingly strict legal and contractual environment. Also, preparedness does involve intensive awareness raising of all personnel, from the most junior employee to top management, providing intra-company notification procedures (e.g. a ‘911’-line).
Of critical importance is prompt notification of incidents under the GDPR and/or NIS legislation, even if not all information is available. To notify or not? It is better to err on the safe side, i.e. to notify (or be able to demonstrate the lack of risk!). Do understand that a data breach constitutes a breach of trust, and to regain trust is difficult. An open communication practice does help in restoring trust.
A lack of response preparedness can also result in increased liabilities, both legal and/or contractual based, with the bar of ‘sufficient preparedness’ steadily rising. Increasingly, companies will request more stringent cyber security measures from partners, contractors etc. or face expensive liabilities. Companies involved in security consulting/services could share these liabilities. Also, cyber insurance will probably become a standard part of the legal toolkit.
Ultimately, do file a criminal complaint, to get more information about the criminals who and why, and to strengthen the information base on criminal incidents.
Even more advice is available in this presentation, including click through links, making this an extremely practical and enlightening session.
Other blog posts
Jeroen Vandeleur (NVISO) gives an overview on the Cloud logging capabilities and how they can be centralized. He also conveys some additional insights on security automation for Incident Response.
In this webinar, Esteban Hernández - Security Specialist at AWS - presents the Top 10 security focus points aimed at improving a customer’s overall security posture.
In this webinar Kati Verstrepen, President of the Ligue for Human Rights, assesses the current state of the human rights in general and the right to privacy in particular. Without the right to privacy, other human rights are being eroded.
In this webinar Mathias Claes, Information Security Officer at AXA Belgium, chronicled the process of introducing cloud services, as Azure and Amazon AWS, in the transformation of AXA’s IT solutions.