This article raises a lot of interested stakeholders in cyber, from legal, to insurance, through to internal risk and audit.
Although, I think it's hard to have a definitive view that legal will inherit, when there many other stakeholders with just as much of a stake.
It'd be great to sit and explore the best way to programmatically demonstrate security effectiveness, and how to scale this down outside of top-tier companies.
This article raises a lot of interested stakeholders in cyber, from legal, to insurance, through to internal risk and audit.
Although, I think it's hard to have a definitive view that legal will inherit, when there many other stakeholders with just as much of a stake.
It'd be great to sit and explore the best way to programmatically demonstrate security effectiveness, and how to scale this down outside of top-tier companies.