Advertising Law Tool Kit - Tenth Edition | 2022

Venable / 27 Here’s how you can leverage the Cybersecurity Framework to manage your security program: Identify • Knowing your risks is the first step in protecting against them. Develop asset management, data governance policies, and risk assessments designed to provide the knowledge and insight required as the first step in cyber risk management. Protect • Prioritizing the many controls necessary to protect modern networks can be a daunting task. Cybersecurity training and information protection; backup procedure reviews; access control and malware protection; and insurance coverage can all help mitigate risk. Detect • Finding threats and vulnerabilities on an organizational network is essential to managing cybersecurity risk. Conduct end-to-end penetration testing of company assets, including networks, websites, and products, and of the third parties that provide technology and services to your organization. Respond • Knowing how to react to an incident or breach takes thought and practice. Retain experienced cybersecurity professionals to create and tailor an incident response plan and assist in incident mitigation. Recover • Getting data and networks back online can be the most difficult challenge for an organization recovering from an incident. Proactively develop an incident response plan, and regularly test the plan by engaging in incident response and recovery exercises tailored to your organization.

RkJQdWJsaXNoZXIy NjYwNzk4