Quantcast
Channel: C-Suite – Cybersecurity Business Law Blog
Browsing all 34 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The SEC Will Begin Looking at Companies’ IT Security and Data Breach Response...

THE POINT: Recent statements from the SEC indicate that the new standard of care for companies may require policies in place for (1) prevention, detection, and response to cyber attacks and data...

View Article



Image may be NSFW.
Clik here to view.

Why is PNC Bank Accusing Morgan Stanley of Corporate Espionage and Trade...

©2011 Braydon Fuller I often write about corporate espionage and trade secrets but I bet some of you may still be trying to imagine real-world scenarios that demonstrate exactly what those terms mean...

View Article

Image may be NSFW.
Clik here to view.

What did Sun Tzu teach about data security?

Sun Tzu taught that, when it comes to data security, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a...

View Article

Image may be NSFW.
Clik here to view.

The Legal Side of Data Breach and Third Party Risk (presentation slides)

Your company is still responsible even if your data breach was caused by a third party. I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and...

View Article

Image may be NSFW.
Clik here to view.

Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Photo Credit: country_boy_shane via Compfight cc Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never...

View Article


Image may be NSFW.
Clik here to view.

The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation

Business leaders must appreciate digital business risk and be proactive in trying to mitigate it. If they do not, they do so at their own peril. Data security is such a threat to businesses that it...

View Article

Image may be NSFW.
Clik here to view.

Two Step Data Breach Risk Test for Texas Businesses

What is a data breach under Texas law? Hint: it doesn’t take much! Does your business have this digital information about other people? 1. last name + first name or first initial + social security...

View Article

Image may be NSFW.
Clik here to view.

What is Corporate Espionage, Industrial Espionage, Cyber Espionage, and...

Cyber Espionage – fact or fiction? What is Cyber Espionage? Corporate espionage, industrial espionage, and cyber espionage all generally mean the same thing: (1) intentionally targeting or acquiring...

View Article


Image may be NSFW.
Clik here to view.

3 Important Questions the State Attorneys General Will Ask Your Company...

In an earlier blog post I wrote about how [w]hen your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your...

View Article


Image may be NSFW.
Clik here to view.

3 Steps the C-Suite Can Take to Strengthen Cyber Security

The C-Suite is ultimately responsible for failures of a company’s cyber security. A recent example of this is how Target’s CEO, CTO, and several Board Members were pushed out in the wake of its data...

View Article

Image may be NSFW.
Clik here to view.

Gov’t Contractors Must Notify of Data Breach Within 3 days

If your business is a contractor for the federal government, you had better have your data breach response ducks in a row. The moment you detect a breach, the clock starts ticking and you have only 3...

View Article

Image may be NSFW.
Clik here to view.

FBI Director Talks Cyber Espionage: Chinese Like “Drunk Burglar”

“[T]here are two kinds of big companies in the United States. There are those who’ve been hacked by the Chinese and those who don’t know they’ve been hacked by the Chinese” -FBI Director The pervasive...

View Article

Image may be NSFW.
Clik here to view.

“Defense wins championships” when preparing for the inevitable data breach

“The best strategy to manage the inevitable data breach of your enterprise is to be prepared.” -Adam Greenberg, SC Magazine Exactly–you must prepare on 2 fronts: Defense & Response In a recent...

View Article


Image may be NSFW.
Clik here to view.

Yes, I will mention this post in tomorrow’s seminar on data breach! “Who’s...

This is one of my favorite and my most popular posts ever — and you better believe I will find a way to mention it to this group of CEOs to help them understand why it is important to take seriously...

View Article

Image may be NSFW.
Clik here to view.

Stop lying to yourself — your business is not prepared for data breach risk

Ponemon studies from September 2014 tell us that 43% of US companies had a data breach last year, even if they are not aware of it, and 78% either do not have a data breach response plan in place or...

View Article


Image may be NSFW.
Clik here to view.

The Art of Data Security: How Sun Tzu Masterminded the Home Depot Data Breach

Sun Tzu taught that, when it comes to the art of data security, you must be wary of your business associates and other third parties. Why? Have you heard that Home Depot had a data breach? That hackers...

View Article

Image may be NSFW.
Clik here to view.

The Public Relations Side of a Data Breach | Platform Magazine

Thank you to Platform Magazine for quoting me discussing the PR component of CyberGard in this forward thinking article about the value of getting public relations on board before your company has a...

View Article


Image may be NSFW.
Clik here to view.

Check out my first post on Norse’s DarkMatters > Sony Hack: Where Do We Die...

Hey everybody, go check out my first post on Norse’s DarkMatters blog — yeah, you know, Norse with the awesome Live Cyber Attack Map! Now that you’re mesmerized by the map, here’s the post and please...

View Article

Image may be NSFW.
Clik here to view.

The Best Evidence Why Your Company Needs a CISO Before a Data Breach

“The proof is in the pudding,” goes the old saying. When it comes to organizational changes companies make following a data breach, If the proof is in the pudding, then the verdict is clear: companies...

View Article

Image may be NSFW.
Clik here to view.

Boards Had Better Start Paying Attention to Cybersecurity

Yesterday Forbes featured an excellent article that explained why it is important for companies to create Board-level committees to focus exclusively on the issue of cybersecurity. Here is just a...

View Article
Browsing all 34 articles
Browse latest View live




Latest Images