Business Continuity Management / Disaster Recovery , Endpoint Security , Governance & Risk Management
Capitol Breach: Cybersecurity Lessons to ApplyBrian Honan: Security Professionals Can Take Action to Minimize Risks
Investigators continue to probe last week's violent storming of the U.S. Capitol. The insurrection left in its wake a potential information security nightmare. The U.S. Justice Department has said that the event may have a “national security” impact, and it's still cataloging the records and devices that may have been stolen after insurgents looted lawmakers' offices.
See Also: Live Webinar | Education Cybersecurity Best Practices: Devices, Ransomware, Budgets and Resources
Cybersecurity expert Brian Honan says that every unattended electronic device, including computers and phones, must now be treated as having potentially been compromised (see: The Cyber Risk Management Challenges After Capitol Riot). A key to question to ask, he says, is: "What can we do as security professionals to minimize the risk to our data in the event of such a situation?"
In a video interview with Information Security Media Group, Honan discusses:
- What security professionals can do to minimize the risk to data posed by challenging or unexpected situations;
- The importance of using real-life stories to foster better security practices;
- Best practices for running "what-if" scenario exercises and applying takeaways.
Honan, CEO and principal consultant at BH Consulting in Dublin, founded Ireland's first computer emergency response team. He's also a cybersecurity adviser to Europol, the EU's law enforcement intelligence agency.