Of course, there is nothing new per se below, but it is a good refresher from the National Law Review website. I find #6 and #9 really interesting.
- No, or inadequate, security program in place.
- No recently conducted vulnerability and risk assessments.
- No evaluation of weaknesses or gaps in your controls in light of statutory requirements and potential common law claims.
- No formalized patching process or inadequate enforcement of the current process to ensure its systematic implementation.
- No insider threat program.
- Lack of connection to the cybersecurity community
- Lack of stringent configuration management.
- Lack of stringent remote access management.
- Failing to consider available cybersecurity data. .
- No incident response plan in place
The Takeaways
- Compare your plans in your security program with the above items at a high level
- If #1 does not exist, fight for and win the budget for completing an IT Security Function Maturity assessment by Deloitte, PwC, E&Y or KPMG
