CNA Lays out Cyber Risk Management Strategy for Ensuring Data Integrity
FREMONT, CA: CNA, a commercial insurance company, announces five critical steps to protect Sensitive Data. The company highlights the threat of cyber attack that every business is exposed to and lays out measures to prevent any threats from affecting the business network and assets.
To strengthen their cyber risk management strategy, businesses needs to follow the five steps: perform risk assessment and understand how to manage and secure data; cyber risk management team has to be trained in sound strategies; implementation of reasonable measures to ensure that vendors have capacity to protect sensitive information; portable devices should be encrypted.
CNA’s Risk Control professionals have the tools, services and solutions needed to address today's cyber-related challenges. To ensure high level of expertise, insurance professionals have Certified Information Privacy Technologist (CIPT) credential from the International Association of Privacy Professionals (IAPP).
"Developing an effective plan to identify possible exposures and measures to minimize risk is vital to the success of any business. The potential consequences of a single data breach can range from sizable monetary penalties, negative publicity, interruption of daily operations and loss of public trust," Hallstrom added.
By Nancy S. Wolk, CIO, Alcoa - Global Business Services
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Bryson Koehler, EVP & CIO, The Weather Company, an IBM...
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Lowell Gilvin, Chief Process Officer, Jabil
By Dennis Hodges, CIO, Inteva Products
By Gerri Martin-Flickinger, CIO, Adobe Systems
By Walter Carvalho, VP& Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Kushagra Vaid, GM, Server Engineering, Microsoft
By Steve Beason, Enterprise CTO, Scientific Games
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Alberto Ruocco, CIO, American Electric Power