Back to Results
First PageMeta Content
National security / Computer crimes / Computer network security / Cyberwarfare / Public safety / International Multilateral Partnership Against Cyber Threats / Business continuity planning / Information security / Business continuity / Security / Computer security / Crime prevention


February 12, 2015 Cybersecurity and Privacy Diligence in a Post-Breach
Add to Reading List

Document Date: 2015-02-12 11:57:54


Open Document

File Size: 200,87 KB

Share Result on Facebook

City

New York / /

Company

Sony / Federal Information Systems / Sony Pictures Entertainment / Anthem / Weil / Gotshal & Manges LLP / /

Continent

America / /

Country

United States / /

/

Event

Employment Change / /

Facility

National Institute of Standards and Technology Computer Security Incident Handling Guide / /

IndustryTerm

software alerts / telephone recovery strategy / keep hardware / incident intrusion detection systems / telephone systems / back-up media / appropriate hardware solution / database server / intrusion detection devices / large network / phone systems / intrusion detections systems / sufficient resources to protect its information systems / subway systems / /

Organization

SEC office of Compliance and Examinations / National Security Agency / Institute of Standards and Technology Computer Security Incident Handling Guide / U.S. Securities and Exchange Commission / Federal Bureau of Investigation / House Intelligence Committee / SEC office of Compliance / Security Intelligence / /

Person

Amy Pascal / Randi Singer Alert Cybersecurity / Paul Ferrillo / Michael Rogers / James Comey / /

/

Position

Director Warns / system administrator / network administrator / co-chairman / Singer / director / email administrator / co-chair / Admiral / lawyer / /

ProvinceOrState

New York / /

Technology

html / operating systems / pdf / Firewall / http / Antivirus software / VOIP / /

URL

http /

SocialTag