Weaver has served in government for nearly 28 years, 21 of those years in the Secret Service. He currently holds the position of deputy special agent in charge of the Secret Service’s Financial Crimes Division and is also the founder and head of the New York Electronic Crimes Task Force, where he supervises a dedicated staff of high-tech crime fighters and criminal investigators. Weaver was at the forefront of a major mind-change in law enforcement regarding electronic crime, helping shift the focus from prosecution to prevention. “CEOs and CSOs must take their risk management proceduresand this includes both physical security and cybersecurityseriously. Some people put the two disciplines together and call it enterprise protection planning, while others call it risk management. I suggest that CEOs, CSOs and CIOs consider that streamlining these two disciplines can provide them with an extra level of fast-tracked communication when times get tough. And having better coordination and communication is just good business. What you may see in the next few years is a movement toward placing the physical security and cybersecurity components closer together in the corporate world so that companies and employees can better protect themselves and their businesses.The best way I can explain the need for preincident planning is this: Get up from your desk right now, walk out the door with nothing but the clothes on your back, run for your life and know that everything you leave behind has been destroyed. And then tomorrow, go back to work. If you can stand up under that battle-tested environment and actually run your business the next day, then you have the kind of robust and redundant systems that can only come from preincident planning. You can’t make that up as you go along. You have to set preplanning policies and procedures at the strategic, tactical and operational level while at the same time protect your data and intellectual property. This means taking a look at every asset and thinking, If I lost this, would I still be in business? Decide what’s most critical to the business, and put backup plans in place so those things can be restored quickly. Your plan must be designed for business continuitynot just survivabilitybecause you need to be able to keep your company up and running. That means having contingency plans, partnerships with other companies and government agencies, and a redundant network in place. And then everyone in the company must know the pre-incident and continuity plans so that if the plans are activated, each employee knows what to do. Companies that don’t do this plan will make a business decision that puts everything at risk every day. Having such a plan in place is money well-spent because you’re protecting both your company’s employees and the business itself.” Related content news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Cybercrime Security news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Government Security Practices news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe