In this day and age where organizations are IT centric internally and externally, IT diligence is extremely important. But with recent breaches in company information, how do you see the need for cybersecurity diligence progressing (especially since it itself is evolving)? And how does one start to value and mitigate the risks involved with this angle of a business?
Cyber security diligence covers real time analytics and other cyber security best practices to monitor vendor’s system. To value or mitigate the risks involved, there are a number of national governments, and even some companies such as Microsoft, have released lists of draft norms for stakeholder consideration. Given both the rich cross-pollination of cyber security best practices and the cyber threat posed by a huge of attackers, conceptions of cyber security due diligence should be gleaned from existing international law but built out through a review of industry norms that are in turn informing national policies.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.