Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

You will face a security breach, are you prepared for the burden of proof?

Are you aware of your legal obligations as an enterprise if you suffer a security breach? “You almost have to be a global lawyer now, if you’re running security, that’s how complex it’s getting” explains Richard Archdeacon, Head of Security Strategy, HP Enterprise Security.

 

There is an ever increasing burden of proof as regulators and legislators demand compliance from enterprise.  And it’s not easy. You need to understand your legal obligations in each country and industry you operate in and if you are breached, you need to be able to provide deep forensics that explains what happened, when, where and how.

 

This recent video with commentary from Andrzej Kawalec, CTO, Jay Huff, EMEA Marketing Director and Richard Archdeacon, Security Strategy discusses the complexities and uncertainties of the issue of breach and shows why "wait and see" is not a valid strategy anymore.

 

Look out for ‘why this presents an opportunity’ and the ‘3 steps to take’ for some key takeaways.

 

 

For more information on HP Security, visit www.hp.com/security or follow @HPSecurity to stay up to date on the latest security news from HP.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author
About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.


Follow Us