Cybersecurity Madness: 3 Things that Really Matter and 3 That Don't

, Corporate Counsel


Here's a road map for corporate legal professionals seeking to cut through the jargon and marketing hype and develop a rational and cost-effective means of managing risks related to data privacy and online security.

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Continue to Lexis Advance®

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at

What's being said

  • Warren Cooper, Evergreen Partners

    What Really Matters should include having a Board approved crisis communications plan in place for the CEO to implement when a breach or malware attack is discovered (and certainly when it‘s made public). Most cybersecurity policies include a fund to hire a pr firm to help manage media, etc. and protect/boost the corp brand and reputation post claim. Shameless plug: very few PR firms specialize in crisis communications, reputation management and litigation support. We do.

  • ALongmore

    I found this article pithy and salient, until I got to the 2nd item on the "doesn‘t matter" list (that often cyber policies "either exclude or underinsure coverage of high probability events..."). The process of purchasing cyber coverage typically begins by identifying exposures and then matching these, when possible to available insurance. So, especially as the marketplace evolves, I cannot agree with this proposition.

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article #1202772298554

Thank you!

This article's comments will be reviewed.