Blogs

Showing Blog Posts: 161–163 of 163 tagged Cybersecurity

  • Security Implications of "Custody and Control"

    by Stephen Wu on October 25, 2008

    The terms "custody" and "control" should be very familiar to cyber-security stakeholders. We are, after all, concerned with internal security issues pertaining to role, access and location management as well as identity management. Note that data location means real or virtual, for those cloud type schema. It's well understood that data can't be protected unless we know what we want to protect, …

  • Why the CSO/CISO Should Care About eDiscovery - Part 2 -

    by Stephen Wu on October 24, 2008

    Legal risks related to electronic discovery present perhaps the most significant emerging enterprise information risk, but this new risk also provides a unique opportunity for the CSO/CISO to increase his or her strategic contributions to the enterprise. In everyday civil (and criminal) litigation. and regulatory investigations and proceedings, electronic discovery ("eDiscovery") presents perhaps…

  • What is Cybersecurity Law and What Do Cybersecurity Lawyers Do?

    by Stephen Wu on October 8, 2008

    So far, our blog has tackled issues of ediscovery: forms of data production and why CISOs should care about ediscovery. But another aspect of our blog is “cybersecurity law” or “information security law.” (I will use the terms interchangeably.) The question naturally arises: what is information security law? Also, what do information security lawyers do? People are familiar with traditional areas…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 28 Jul 2014 04:18:37 -0400.
© 2014 EMC Corporation. All rights reserved.