Many companies live and die by their reputations. Therefore, during a cyberattack, they have more to manage than just infrastructure vulnerability patches.
Speakers at ALM’s 2016 CyberSecure conference spoke to some of the core strategies companies can and have used to secure their public image on a panel entitled “Protecting Your Intangibles: Reputation Management During and Post Cyber-attack.” Here are four tips they offered:
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]