SRS Technical Blogs

The cost and difficulty of protecting an entire enterprise from all manner of cyber threats can be overwhelming. Accordingly, an organization should prioritize its cybersecurity efforts. Different organizations have different mission-critical needs. For some organizations, even a short-term disruption in email service will have a devastating impact on operations. Other organizations may not be so dependent on email to conduct their business, but they may suffer significant harm if certain intellectual property is stolen. For others, the ability to guarantee the integrity and security of the data they store and process is the essential service that must be protected. Before formulating a cyber incident response plan, an organization should first determine which of its data, assets, and services warrants the greatest protection.

Identify Your 'Crown Jewels'

The cost and difficulty of protecting an entire enterprise from all manner of cyber threats can be overwhelming. Accordingly, an organization should prioritize its cybersecurity efforts. Different organizations have different mission-critical needs. For some organizations, even a short-term disruption in email service will have a devastating impact on operations. Other organizations may not be so dependent on email to conduct their business, but they may suffer significant harm if certain intellectual property is stolen. For others, the ability to guarantee the integrity and security of the data they store and process is the essential service that must be protected. Before formulating a cyber incident response plan, an organization should first determine which data, assets, and services warrant the greatest protection.

In December 2014, the Criminal Division created the Cybersecurity Unit within the Computer Crime and Intellectual Property Section to serve as a central hub for expert advice and legal guidance regarding how the criminal electronic surveillance and computer fraud and abuse statutes impact cybersecurity.

The Cybersecurity Unit originally published this “best practices” document to help organizations prepare a cyber incident response plan and, more generally, to better equip themselves to respond effectively and lawfully to a cyber incident. You can download and read the entire report here.

//

Sign Up For Our Newsletter


Blog Categories