Mature privacy programs, when well implemented, can cover much of the risk inherent in storing and processing personal and sensitive information within your organization. That said, the ever increasing threat of cyberattacks makes it impossible to account for all risk. Enter cyberinsurance. A well considered policy purchased after a thorough internal evaluation can take up much of the "residual risk" remaining after accounting for your privacy program controls. This process is complicated and challenging in a changing marketplace. Understanding what you need to know to best approach the purchasing process is critical to selecting the right policy for your organization. Join our panel of experienced professionals on Dec. 22 for the IAPP Web Conference "Evaluating and Purchasing Cyberinsurance: What you Need to Know." Panelists will discuss how to determine if you need a policy, what to do to prepare for purchase, and how to effectively evaluate the existing field of vendors.
If you want to comment on this post, you need to login.