ARTICLE
23 November 2021

Will your cybersecurity expert stand up in court?

K
KordaMentha

Contributor

KordaMentha, an independent firm in Asia-Pacific, specializes in cybersecurity, financial crime, forensic, performance improvement, real estate, and restructuring services. With a diverse team of almost 400 specialists, they provide customised solutions to help clients grow, protect from financial loss, and recover value. Trusted since 2002, they deliver bold, impactful solutions for clients.
As cyber incidents continue to evolve, sourcing commensurate cybersecurity expertise is critical. Link to original article included.
Australia Litigation, Mediation & Arbitration

As cyber incidents continue to evolve, sourcing commensurate cybersecurity expertise is critical.

Brendan Read recently shared his insights with the Australian Information Security Association into how critical the choice of cybersecurity expert can be.

Enhanced reporting obligations and increased regulatory pressure has placed additional responsibility on companies and directors when it comes to cybersecurity. There is also no doubt that the sophistication of cyber attacks has intensified.

In the article, Brendan highlights the subsequent increase in demand for experts who can, ".bring the threat to heel, document the exfiltration competently, mitigate impacts and appear as a reliable expert witness in court, if need be."

Brendan discusses the imperative for cyber professionals to gather evidence, produce reports and provide witness testimony that will stand up to scrutiny. An investigative mindset, clear methodology and repeatable analysis are all crucial elements of a robust cyber incident response. The sensitive nature of these incidents and the data involved also warrants a highly qualified and experienced professional.

When required to give evidence in court, your expert's ability to communicate cannot be overlooked. "If cyber experts fail to articulate their work and explain the decision-making process, then the court will struggle to understand the methodology and the evidence will be deemed inadmissible."

Click here to read the original article, as published by the Australian Information Security Association.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More