Risk Management & Insurance Industry - Knowledge & Resource Center

GCat: Risk Mgt, Claims, Ins
MCat: Security
Cat: Computer Crime

Links to Cyber Incident Response Teams and Security-Related Organizations. Resources involved in detecting and resolving computer security incidents. Hacker news. Research documents and news related to cyberspace computer crime. Key legal factors regarding searching and seizing electronic storage devices and media.

17 Resources
CERT Coordination Center [13851] ?

Work with the Internet community in detecting and resolving computer security incidents

Company Data Security [40805] ?

Essential elements of a data security policy

Computer Crime and Intellectual Property Section of US Dept of Justice [13845] ?

CCIPS works closely on computer crime cases with Assistant United States Attorneys CTCs

Data Security Breaches [30095] ?

A documented plan for responding to security incidents is essential

Executive Order -- Improving Critical Infrastructure Cybersecurity [40405] ?

Text of the Executive Order related to cybersecurity - February 12, 2013

Executive Order on Improving Critical Infrastructure Cybersecurity [40406] ?

What you need to know about the Executive Order related to cybersecurity - February 12, 2013

How to Report Internet Related Crime [26239] ?

The primary federal law enforcement agencies that investigate domestic crime on the Internet include the following

Internet Crime Complaint Center [26236] ?

Receive internet related criminal complaints and refer to law enforcement agencies for investigation

Internet Crime Complaint Center - Filing a Complaint [26237] ?

How to file a complaint with the US FBI regarding internet fraud

Updated Laptop Computer Physical Security [35716] ?

Advice for laptop owners

Laptop/Notebook Computer Security [39925] ?

Loss prevention tips for the office, airport, car

Network Insecurity [20585] ?

China is by no means our only cyber-security problem

OnGuard Online [39881] ?

Tips to be on guard against internet fraud, secure your computer, and protect your personal information

The Reality of Hackers [19899] ?

A Computer Hacker Strikes Every 39 Seconds

Top Ways to Protect Your Privacy Online [19938] ?

Advice and information on protecting your online privacy

US-CERT [12946] ?

Detect, deter, assess, warn of, respond to &investigate computer intrusions &unlawful acts

What You Can Do to Help Protect Your Business Against Cyber Attacks [40804] ?

The importance of a cyber security program

Related Categories & Information

- rmLibrary : Related Categories (7)

Disasters / Computers
Computer disaster recovery plan

Disasters / Counter-Terrorism
Anti-terrorist activities

Legal / Computer Law
Case developments, articles, resources related to computer technology & the law

Legal / E-Privacy
Sample internet privacy policies and statements, COPPA requirements

Legal / Internet Law
Case developments, articles, resources related to internet technology

Risk Mgt / Cyberliability
Insurance coverage issues for internet liability

Technology / Security
Providing secure transactions over the internet

- Cross References to other LAD Libraries (17)

My Bookmarks | Last 25

Words of Wisdom

"Confidence, like art, never comes from having all the answers; it comes from being open to all the questions.

- Benjamin Disraeli

Risk Management & Insurance - Core Values and Available Information