EDRM Partner, Canopy, Solves for Breach Notification
With attack surfaces expanded from the enterprise to include more work on home computers and networks compounded by states and localities enacting new privacy and data breach requirements, it is a question of when and not if an organization will suffer a breach.
Not getting breached in the first place by establishing robust cyber defenses is always going to be the end goal, but cleaning up the aftermath of a breach is now just as important as preventing it.Ralph Nickl, founder and CEO of Canopy Software.
Organizations that want to be in compliance and protect their brand need to assess their incident response handling protocols in the light of changing regulations and changing attack vectors. According to Nickl, it is important to address:
differences in each law and ensuring that your company remains in compliance with them based on your given situation. For example, each state’s laws have specific and varying provisions regarding who must comply, how personal information is defined, what constitutes a data breach, requirements for notice, exemptions and more.