Wednesday, October 30, 2013

Big Data and a 'Defensible' Breach Response

Your response to data breaches will be scrutinized by regulators so a 'defensible response' to breaches is necessary warns former prosecutor Kim Peretti.

Ms. Peretti suggests detailed incident response, breach response and breach notification plans; a breach response checklist is essential to "knowing what steps to take in the initial stages so that you can ensure the proper decisions are being made in how to approach the investigation."

"Hire investigators that can apply big data to forensics "so a five-month investigation can turn into a five-week investigation."
- BankInfoSecurity.com
She outlines a number of common mistakes organizations make during breach investigations. Among them are failing to preserve all the evidence as well as not applying big data to forensics "so a five-month investigation can turn into a five-week investigation."

Organizations can now utilize low-cost on-demand SaaS big data analytics services for rapid answers during a breach investigation.

Learn how Veriphyr Identity and Access Intelligence delivers data breach insights - with no hardware and no on-site software.
Sources:
(a) Building a 'Defensible' Breach Response - www.BankInfoSecurity.com, 10/23/2013

No comments:

Popular Posts

Copyright © 2010-2011 by Veriphyr Incorporated, All Rights Reserved.

Contact us at Veriphyr.com.