The Cybersecurity Law Report

Incisive intelligence on cybersecurity law and regulation

Articles By Topic

By Topic: Data Mapping

  • From Vol. 2 No.22 (Nov. 2, 2016)

    Guide to Getting Your Security Program Certified Under ISO 27001

    Companies seeking guidance in the development and implementation of their information security programs are looking for a robust and recognized framework. The ISO/IEC 27001 standard offers exactly that, while also providing a useful evaluation process and valuable certification. In a guest article, Lionel Cochey, director of information of a large international law firm, provides a roadmap to the key aspects of the standard, the certification process, and the ongoing effort to remain certified on an annual basis. See also “Steps for Companies to Take This Week, This Month and This Year to Meet the Challenges of International Cyberspace Governance” (Mar. 30, 2016).

    Read Full Article …
  • From Vol. 1 No.1 (Apr. 8, 2015)

    Ten Actions for Effective Data Risk Management

    High-profile data breaches expose breached companies to intense negative scrutiny from lawmakers, regulators, media, customers and plaintiffs’ attorneys.  But not every data breach is a headline-grabbing theft of consumer credit card data – and small breaches cannot be ignored.  Effective information risk management to prevent data leaks, the unauthorized transfer of information to the outside world, and security breach incidents requires a top-driven coordinated information security compliance program that is implemented on a company-wide basis.  In a guest article, Jesse M. Brody, a partner at Manatt Phelps & Phillips, provides ten immediate steps companies should take to prevent data leaks and larger breach events.

    Read Full Article …