Hard Questions: Security Incident Analysis, Reporting and Management
-
Security incidents are coming to light through dark webs. How effective are organizations’ systems in detecting incidents? Where do you think we are having debts?
-
How are companies handling the immediate need to rotate access keys and credentials that have been compromised?
-
How practical is RBI’s rule on reporting security incidents within 1 hour?
-
What is your take on Controller’s contractual requirement for Processors (under GDPR) to report security incidents within 24 hours?
-
How effective are organizations in having a list of all customers’ security incidents reporting coordinates?
-
Are companies having advance contracts (with right NDA and terms and conditions) with regional / global Legal and PR advisors for handling security and privacy incidents?
{{ gettext('Login to leave a comment') }}
{{ gettext('Post a comment…') }}{{ errorMsg }}
{{ gettext('No comments posted yet') }}