Mature privacy programs, when well implemented, can cover much of the risk inherent in storing and processing personal and sensitive information within your organization. That said, the ever-increasing threat of cyberattack makes it impossible to account for all risk. Enter cyberinsurance. A well considered policy purchased after a thorough internal evaluation can take up much of the "residual risk" remaining after accounting for your privacy program controls. This process is complicated and challenging in a changing marketplace. Understanding what you need to know to best approach the purchasing process is critical to selecting the right policy for your organization. Best to get up to speed with the recorded web conference, "Evaluating and Purchasing Cyberinsurance: What you Need to Know," which is now available in the IAPP recordings library.
If you want to comment on this post, you need to login.