TOTAL: {[ getCartTotalCost() | currencyFilter ]} Update cart for total shopping_basket Checkout

Daily Dashboard | Web con: What you need to know about evaluating cyberinsurance Related reading: Government leaders discuss UK adequacy, data transfers



Mature privacy programs, when well implemented, can cover much of the risk inherent in storing and processing personal and sensitive information within your organization. That said, the ever increasing threat of cyberattacks makes it impossible to account for all risk. Enter cyberinsurance. A well considered policy purchased after a thorough internal evaluation can take up much of the "residual risk" remaining after accounting for your privacy program controls. This process is complicated and challenging in a changing marketplace. Understanding what you need to know to best approach the purchasing process is critical to selecting the right policy for your organization. Join our panel of experienced professionals on Dec. 22 for  the IAPP Web Conference "Evaluating and Purchasing Cyberinsurance: What you Need to Know." Panelists will discuss how to determine if you need a policy, what to do to prepare for purchase, and how to effectively evaluate the existing field of vendors.
Full Story


If you want to comment on this post, you need to login.