Leadership in the cyber warfare era: Formulating a data breach reporting and management strategy
Garikai Chimuka
Cyber Security: A Peer-Reviewed Journal, 2019, vol. 2, issue 4, 336-345
Abstract:
This paper focuses on one of the fundamental requirements of the General Data Protection Regulation (GDPR), namely the duty to inform data protection regulators and users promptly when there has been breach of user data. It notes that many corporate leaders fear this requirement, which is generally viewed as an unnecessary expense on the organisation. It argues, however, that responsible leaders must embrace this requirement and view it not as a threat but an opportunity to continuously improve their systems. It posits that responsible leaders must not fear this, whether they are governed by the GDPR or not. The paper highlights, with some examples, the major data breaches that have compromised user information in arguing that while investment in robust end-to-end security systems is imperative, it cannot guarantee against data breach due to the increasing sophistication of both state and non-state hackers. It analyses some reasons why many leaders often try to conceal data breach and concludes by proffering some advice, backed by practical examples of how responsible leadership can formulate novel and holistic data breach reporting and management strategies that go beyond the traditional crisis management and continuity models.
Keywords: data breach; responsible leadership; GDPR; crisis management; continuity models (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2019
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/1774/download/ (application/pdf)
https://hstalks.com/article/1774/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2019:v:2:i:4:p:336-345
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().