Capitol Breach: Cybersecurity Lessons to ApplyBrian Honan: Security Professionals Can Take Action to Minimize Risks
Investigators continue to probe last week's violent storming of the U.S. Capitol. The insurrection left in its wake a potential information security nightmare. The U.S. Justice Department has said that the event may have a "national security" impact, and it's still cataloging the records and devices that may have been stolen after insurgents looted lawmakers' offices.
Cybersecurity expert Brian Honan says that every unattended electronic device, including computers and phones, must now be treated as having potentially been compromised (see: The Cyber Risk Management Challenges After Capitol Riot). A key to question to ask, he says, is: "What can we do as security professionals to minimize the risk to our data in the event of such a situation?"
In a video interview with Information Security Media Group, Honan discusses:
- What security professionals can do to minimize the risk to data posed by challenging or unexpected situations;
- The importance of using real-life stories to foster better security practices;
- Best practices for running "what-if" scenario exercises and applying takeaways.
Honan, CEO and principal consultant at BH Consulting in Dublin, founded Ireland's first computer emergency response team. He's also a cybersecurity adviser to Europol, the EU's law enforcement intelligence agency.