{"id":829,"date":"2018-06-18T13:30:38","date_gmt":"2018-06-18T17:30:38","guid":{"rendered":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/?p=829"},"modified":"2018-06-18T13:30:38","modified_gmt":"2018-06-18T17:30:38","slug":"cybersecurity-new-changes-terms-responsibility","status":"publish","type":"post","link":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/2018\/06\/18\/cybersecurity-new-changes-terms-responsibility\/","title":{"rendered":"Cybersecurity Has Some New Changes in Terms of Responsibility"},"content":{"rendered":"

Many cybersecurity experts are claiming that cybersecurity itself is an issue that pertains to the C-suite and board. This challenges the atypical viewpoint of how companies have traditionally treated cybersecurity issues as an IT issue.<\/p>\n

\u201cIf you went to a cardiologist, you wouldn\u2019t want him to work on your brain,\u201d says Richard Frankel, Of counsel at Ruskin Moscou Faltischek, P.C. \u201cIt\u2019s the same with IT and cybersecurity. The IT guys are great at setting up computers and programs…but they\u2019re not cybersecurity experts.\u201d Ruskin Moscou is a law firm that specializes in a wide range of issues, where Frankel\u2019s practice focuses on… Read more<\/a> <\/i><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"

Many cybersecurity experts are claiming that cybersecurity itself is an issue that pertains to the C-suite and board. This challenges the atypical viewpoint of how companies have traditionally treated cybersecurity issues as an IT issue. \u201cIf you went to a cardiologist, you wouldn\u2019t want him to work on your brain,\u201d says Richard Frankel, Of counsel […]<\/p>\n","protected":false},"author":57,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-829","post","type-post","status-publish","format-standard","hentry","category-cyber-security-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/comments?post=829"}],"version-history":[{"count":1,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/829\/revisions"}],"predecessor-version":[{"id":830,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/posts\/829\/revisions\/830"}],"wp:attachment":[{"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/media?parent=829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/categories?post=829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huangshizhaopin.com\/academics\/graduate-programs\/master-of-science-in-cyber-security\/wp-json\/wp\/v2\/tags?post=829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}