Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    New ‘LucidRook’ malware used in targeted attacks on NGOs, universities

    April 9, 2026

    VU#536588: Multiple Heap Buffer Overflows in Orthanc DICOM Server

    April 9, 2026

    SSA-673996 V1.3 (Last Update: 2025-12-09): Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products

    April 9, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»From Legal Theory to Practice
    News

    From Legal Theory to Practice

    adminBy adminApril 9, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Not long ago, “reasonable cybersecurity” was a term you’d mostly find in legal documents or regulatory filings. It was referenced in lawsuits and privacy laws, but it didn’t mean much to the people actually responsible for protecting systems and data. There was no clear definition, no roadmap, and no consensus on what made a security program “reasonable.” That lack of clarity left organizations guessing—and often exposed.

    At the Center for Internet Security (CIS), we are working to change that. Our goal has always been to help organizations build cybersecurity programs that are effective, measurable, practical, defensible, and tailored to their real-world risks. Through tools like the CIS Critical Security Controls, the CIS Risk Assessment Method (CIS RAM), and our policy templates, we’ve created a foundation that organizations can use to make smart, risk-aware decisions—and back them up when it counts.

    Why Reasonable Cybersecurity Matters Now More Than Ever

    legal landscape iconThe legal landscape is catching up. States like Ohio, Utah, Connecticut, Iowa, and Texas have passed laws that explicitly reference reasonable cybersecurity. Many of these laws offer liability protections to organizations that follow recognized frameworks like the CIS Controls or the NIST Cybersecurity Framework. Other states—New York, Idaho, North Dakota, and Ohio—are weaving cybersecurity expectations into procurement rules, insurance regulations, and public-sector mandates.

    This shift is important. Regulators and courts aren’t just asking whether you had security—they’re asking whether it was appropriate, documented, and based on a thoughtful risk assessment. Reasonable cybersecurity is becoming a standard that organizations need to meet, not just aspire to. And for consumers, this evolution offers something critical: assurance. When organizations adopt reasonable cybersecurity practices, they’re not just protecting their own assets—they’re safeguarding the personal data, privacy, and trust of the individuals they serve.

    One Size Doesn’t Fit All

    One of the most important lessons we’ve learned is that reasonable cybersecurity is contextual. What’s reasonable for a small nonprofit is different from what’s reasonable for a multinational financial institution. That’s why CIS introduced Implementation Groups (IGs)—a tiered model that helps organizations prioritize safeguards based on their size, resources, and risk exposure.

    This approach ensures that organizations aren’t overburdened by unrealistic expectations. Instead, they’re empowered to make informed decisions about which controls to implement, how to justify them, and how to demonstrate that they’ve taken appropriate steps to protect their data. And when those decisions are made thoughtfully, consumers benefit—because their information is being handled with care, not just compliance.

    Reasonable cybersecurity isn’t about perfection—it’s about making decisions that can be defended in court, in audits, and in the eyes of the public.

    A Practical Guide for Defining Reasonable Cybersecurity

    To help organizations navigate this evolving landscape, CIS developed A Guide to Defining Reasonable Cybersecurity. Created in collaboration with legal and technical experts, the guide offers a framework for building a cybersecurity program that meets today’s expectations—and tomorrow’s challenges.
    It outlines how to evaluate your cybersecurity posture, apply risk-based methodologies, and align with defensible standards of care. Whether you’re a CISO, legal counsel, compliance officer, or IT leader, this guide provides the clarity and structure needed to move from ambiguity to action.

    Looking Ahead

    We’ve made real progress, but there’s more work ahead. At CIS, we’ll keep refining our tools, expanding our guidance, and working with partners across industries to make sure reasonable cybersecurity isn’t just a legal term—it’s something every organization can understand, implement, and trust.

    Reasonable cybersecurity isn’t about checking boxes. It’s about making smart, risk-aware choices—and being ready to prove it when it matters most. And when done right, it doesn’t just protect systems—it protects people.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHackTheBox – DarkZero
    Next Article SSA-673996 V1.3 (Last Update: 2025-12-09): Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products
    admin
    • Website

    Related Posts

    News

    New ‘LucidRook’ malware used in targeted attacks on NGOs, universities

    April 9, 2026
    News

    THREATCON1 2025 Recap: A New Standard for Cybersecurity Events | Blog

    April 9, 2026
    News

    Building a Secure Cloud Foundation for Healthcare with CIS

    April 9, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    New ‘LucidRook’ malware used in targeted attacks on NGOs, universities

    April 9, 2026

    VU#536588: Multiple Heap Buffer Overflows in Orthanc DICOM Server

    April 9, 2026

    SSA-673996 V1.3 (Last Update: 2025-12-09): Buffer Overflow Vulnerability in Third-Party Component in SICAM and SITIPE Products

    April 9, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.