Expert IT Leadership Blogs

The cost and difficulty of protecting an entire enterprise from all manner of cyber threats can be overwhelming. Accordingly, an organization should prioritize its cybersecurity efforts. Different organizations have different mission-critical needs. For some organizations, even a short-term disruption in email service will have a devastating impact on operations. Other organizations may not be so dependent on email to conduct their business, but they may suffer significant harm if certain intellectual property is stolen. For others, the ability to guarantee the integrity and security of the data they store and process is the essential service that must be protected. Before formulating a cyber incident response plan, an organization should first determine which of its data, assets, and services warrants the greatest protection.

Identify Your 'Crown Jewels'

The cost and difficulty of protecting an entire enterprise from all manner of cyber threats can be overwhelming. Accordingly, an organization should prioritize its cybersecurity efforts. Different organizations have different mission-critical needs. For some organizations, even a short-term disruption in email service will have a devastating impact on operations. Other organizations may not be so dependent on email to conduct their business, but they may suffer significant harm if certain intellectual property is stolen. For others, the ability to guarantee the integrity and security of the data they store and process is the essential service that must be protected. Before formulating a cyber incident response plan, an organization should first determine which data, assets, and services warrant the greatest protection.

In December 2014, the Criminal Division created the Cybersecurity Unit within the Computer Crime and Intellectual Property Section to serve as a central hub for expert advice and legal guidance regarding how the criminal electronic surveillance and computer fraud and abuse statutes impact cybersecurity.

The Cybersecurity Unit originally published this “best practices” document to help organizations prepare a cyber incident response plan and, more generally, to better equip themselves to respond effectively and lawfully to a cyber incident. You can download and read the entire report here.

//

Sharad Suthar

Sharad has a proven track record of delivering successful IT projects underpinned by creative problem-solving and strategic thinking. He brings an extraordinary combination of in-depth technical knowledge, problem-solving skills, and dedication to client satisfaction that enables him and his team at Strategic Response Systems to deliver optimal IT solutions tailored to the specific needs of each organization, from large corporates to small businesses. His impeccable attention to detail and accuracy ensure that his clients get the best possible results.

SRS Chat