Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tried GPTGirlfriend So You Don’t Have To: My Trustworthy Overview

    July 30, 2025

    New Choicejacking Assault Steals Knowledge from Telephones through Public Chargers

    July 30, 2025

    Nvidia chips: Trump handed China a serious benefit on AI

    July 30, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»4 methods to safeguard CISO communications from authorized liabilities
    AI Ethics & Regulation

    4 methods to safeguard CISO communications from authorized liabilities

    Declan MurphyBy Declan MurphyMay 20, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    4 methods to safeguard CISO communications from authorized liabilities
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link



    One pitfall for any skilled is humor, which, stripped from its context and atmosphere, can tackle new meanings and be used towards CISOs in litigation. Even utilizing memes of dumpster fires, for instance, or typing LOL in a message can be utilized as admissions of guilt or to painting cavalier attitudes towards safety, exposing cyber groups to much more legal responsibility.

    “Once we say LOL, 90% of the time you weren’t really laughing out loud, however we use these very casual methods of speaking with each other,” WilmerHale’s Jones stated. “And that stuff reveals up with regularity in circumstances when you might have a big cyber incident. LOL or dumpster hearth will not be the easiest way to speak about it internally as a result of that’s what’s going to point out up” in litigation.

    Take note of the medium

    CISOs additionally want to concentrate to what they are saying primarily based on the medium through which they’re speaking. Take note of “how we talk, who we’re speaking with, what platforms we’re speaking on, and whether or not it’s oral or written,” Angela Mauceri, company director and assistant common counsel for cyber and privateness at Northrop Grumman, stated at RSA. “There’s an enduring impact to written communications.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    New Choicejacking Assault Steals Knowledge from Telephones through Public Chargers

    July 30, 2025

    Wiz Uncovers Vital Entry Bypass Flaw in AI-Powered Vibe Coding Platform Base44

    July 30, 2025

    Android Banking Malware Masquerades as Authorities Companies to Assault Customers

    July 29, 2025
    Top Posts

    Tried GPTGirlfriend So You Don’t Have To: My Trustworthy Overview

    July 30, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Tried GPTGirlfriend So You Don’t Have To: My Trustworthy Overview

    By Amelia Harper JonesJuly 30, 2025

    You click on on Tickeron considering, “AI buying and selling bot—sounds futuristic,” and then you…

    New Choicejacking Assault Steals Knowledge from Telephones through Public Chargers

    July 30, 2025

    Nvidia chips: Trump handed China a serious benefit on AI

    July 30, 2025

    Mistral-Small-3.2-24B-Instruct-2506 is now accessible on Amazon Bedrock Market and Amazon SageMaker JumpStart

    July 30, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.