Administrative/Regulatory
Dec. 23, 2014
For cybersecurity, share and share alike
As 2014 rolls into 2015, cybersecurity and how to protect corporate assets remains a widely debated topic.





Mary Ellen Callahan
The Walt Disney CompanyEmail: mary.ellen.callahan@disney.com
PIG Tales: This regular column is devoted to issues of critical importance to the Privacy and Information Governance (PIG) communities. Provided by the former chief privacy officer of the U.S. Department of Homeland Security, PIG Tales discusses cutting edge issues while offering valuable insight and practical advice to companies on how to collect, use, store, protect and share their sensitive data in an efficient, effective, and compliant manner.

PIG Tales
As 2014 rolls into 2015, cybersecurity and how to protect corporate assets remains a widely debated topic. If there is one New Year's resolution companies should make - and keep - it is to consider participating in information sharing arrangements to share cybersecurity threat information and signatures (with appropriate controls and protections). Information sharing in this way allows companies to leverage knowledge beyond their o...
For only $95 a month (the price of 2 article purchases)
Receive unlimited article access and full access to our archives,
Daily Appellate Report, award winning columns, and our
Verdicts and Settlements.
Or
$795 for an entire year!
Or access this article for $45
(Purchase provides 7-day access to this article. Printing, posting or downloading is not allowed.)
Already a subscriber?
Sign In