Latest Publications

Share:

[Webinar] Mastering the Cyber Storm: Tailored Tabletop Exercises for Unmatched Resilience - March 20th, 1:00 pm - 2:00 pm ET

Join us for a pivotal journey into the heart of cybersecurity response with Industry Experts Dr. Jack Dever, JD, LLM, SJD, CEO and James Álvaro Dever, Esq., Principal at Lockhaven Solutions, LLC....more

[Webinar] Banks in the Crosshairs: Cyberattacks and Aggressive Regulators - May 25th, 1:00 pm - 2:00 pm ET

Financial institutions are in a tough spot- caught between the “bad guys” (state-sponsored cyberattacks and cyber criminals) and “good guys” (ever more aggressive regulators)- what’s a bank to do??? Tune in to find out!...more

Cyber Risk Management Chronicles, Episode IX – A Tale of Two Companies

A picture is worth 1,000 words (especially if it has a lot of words on it). See Infographic below....more

Cyber Risk Management Chronicles, Episode VIII - Cyber Fundamentals: You Can’t Spell “Cybersecurity” Without “IG”

All too often, organizations forget that cybersecurity is not a technology, it is a strategy. Throughout the industry we see reliance placed on technical solutions without much thought given to fundamentals and risk-based...more

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

Cyber Risk Management Chronicles, Episode VII - Cyber Fundamentals: Ready or Not, Here it Comes!

From a regulatory perspective, many industries have been living in the land of milk and honey as cyber programs have largely been guided by voluntary measures. However, regulator’s patience has grown thin with the public...more

Cyber Risk Management Chronicles, Episode VI - Cyber Fundamentals: The New Cybersecurity Triad

Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more

Cyber Risk Management Chronicles, Episode V - Cyber Fundamentals: Tabletop Exercises

Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program.  The efficacy of a program is only theoretical until thorough testing is conducted.  One of...more

Cyber Risk Management Chronicles, Episode IV - Cyber Fundamentals: Benefits of the NIST CSF

The CyberSecurity Framework (CSF) was created to solve a pernicious problem – repeated, damaging cyberattacks against US critical infrastructure sectors. The danger was such that President Barack Obama directed a federal...more

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

Cyber Risk Management Chronicles, Episode III

The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With such an approach,...more

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

Cyber Risk Management Chronicles: Episode 1 - Cyber Fundamentals: Role of Senior Management

All organizations are at different stages of cybersecurity risk management program development. These stages range from one end of the spectrum, where cybersecurity is not a consideration at all, to the opposite end where the...more

[Flash Webinar] "Cyberwar and the ‘Iceberg Problem’ in Ukraine and Beyond. Can the USG Stop Cyberattacks Against the Private...

Russian intelligence agencies have hacked dozens of civilian organizations in the U.S. and other Ukraine-allied nations since February. While this activity has garnered a great deal of attention due to the conflict in...more

[Flash Webinar] Deleted Text Messages from Secret Service, DOD & DHS - August 18th, 1:00 pm - 2:15 pm ET

EDRM Ripped From the Headlines Webinar Series: In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the Practice at the University of Maryland and James and Jack Dever, cyber attorneys...more

Illumination Zone: James & Jack Dever of Lockhaven Solutions, LLC along with Patricia Diaz-Rodriguez of Ankura sit down with Mary...

Jack and James Dever of Lockhaven Solutions, LLC. a cybersecurity firm specializing in transforming cyber cultures through education sit down with Kaylee & Mary to talk about their family legacy of service and their journey...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide