Latest Posts › Electronically Stored Information

Share:

Cyber Risk Management Chronicles, Episode IX – A Tale of Two Companies

A picture is worth 1,000 words (especially if it has a lot of words on it). See Infographic below....more

Cyber Risk Management Chronicles, Episode VIII - Cyber Fundamentals: You Can’t Spell “Cybersecurity” Without “IG”

All too often, organizations forget that cybersecurity is not a technology, it is a strategy. Throughout the industry we see reliance placed on technical solutions without much thought given to fundamentals and risk-based...more

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

Cyber Risk Management Chronicles, Episode VII - Cyber Fundamentals: Ready or Not, Here it Comes!

From a regulatory perspective, many industries have been living in the land of milk and honey as cyber programs have largely been guided by voluntary measures. However, regulator’s patience has grown thin with the public...more

Cyber Risk Management Chronicles, Episode VI - Cyber Fundamentals: The New Cybersecurity Triad

Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more

Cyber Risk Management Chronicles, Episode V - Cyber Fundamentals: Tabletop Exercises

Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program.  The efficacy of a program is only theoretical until thorough testing is conducted.  One of...more

Cyber Risk Management Chronicles, Episode IV - Cyber Fundamentals: Benefits of the NIST CSF

The CyberSecurity Framework (CSF) was created to solve a pernicious problem – repeated, damaging cyberattacks against US critical infrastructure sectors. The danger was such that President Barack Obama directed a federal...more

[Webinar] Cyber Sidebar: The NIST Cybersecurity Framework Applied to the Legal Profession - November 15th, 1:00 pm - 2:15 pm ET

The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more

Cyber Risk Management Chronicles, Episode III

The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With such an approach,...more

Cyber Fundamentals: Cybersecurity as Part of Risk Management - Cyber Risk Management Chronicles, Episode II

Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more

Cyber Risk Management Chronicles: Episode 1 - Cyber Fundamentals: Role of Senior Management

All organizations are at different stages of cybersecurity risk management program development. These stages range from one end of the spectrum, where cybersecurity is not a consideration at all, to the opposite end where the...more

[Flash Webinar] Deleted Text Messages from Secret Service, DOD & DHS - August 18th, 1:00 pm - 2:15 pm ET

EDRM Ripped From the Headlines Webinar Series: In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the Practice at the University of Maryland and James and Jack Dever, cyber attorneys...more

12 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide