NOT FOR REPRINT
Page Printed from: treasuryandrisk.com/author/profile/mike-donovan/
Sign In To follow
Companies are primarily focused on protections when instead they should be considering what to do after the systems are breached.
{ "author": { "name": "Mike Donovan", "webUrl": "/author/profile/mike-donovan/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 1, "social": [], "articles": [ { "uri": "/2014/07/03/lessons-learned-from-1000-data-breaches-and-counti/", "title": "Lessons Learned from 1,000 Data Breaches … and Counting", "byline": "Mike Donovan", "kicker": "Best Practices", "prettyDate": "July 03, 2014", "timeToRead": "5 minute", "image": { "uri": "", "width": "", "height": "" }, "authors": [ { "webUrl": "/author/profile/mike-donovan/", "name": "Mike Donovan" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "Companies are primarily focused on protections when instead they should be considering what to do after the systems are breached.", "body": null } ] } }