A picture is worth 1,000 words (especially if it has a lot of words on it). See Infographic below....more
All too often, organizations forget that cybersecurity is not a technology, it is a strategy. Throughout the industry we see reliance placed on technical solutions without much thought given to fundamentals and risk-based...more
GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more
2/3/2023
/ Cyber Threats ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Data Protection ,
Data Security ,
e-Discovery Professionals ,
Electronically Stored Information ,
NIST ,
Popular ,
Webinars
From a regulatory perspective, many industries have been living in the land of milk and honey as cyber programs have largely been guided by voluntary measures. However, regulator’s patience has grown thin with the public...more
Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...more
Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough testing is conducted. One of...more
The CyberSecurity Framework (CSF) was created to solve a pernicious problem – repeated, damaging cyberattacks against US critical infrastructure sectors. The danger was such that President Barack Obama directed a federal...more
The legal profession is under constant threat of cyberattacks and breaches. Cybersecurity challenges exist in many contexts but the legal profession is particularly vulnerable due to its federated environment and disparate...more
10/18/2022
/ Client Data ,
Cyber Attacks ,
Cybersecurity ,
Cybersecurity Framework ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
e-Discovery Professionals ,
Electronically Stored Information ,
Information Security ,
Law Firm Associates ,
Law Firm Partners ,
NIST ,
Webinars
The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With such an approach,...more
Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability that these risks will occur,...more
All organizations are at different stages of cybersecurity risk management program development. These stages range from one end of the spectrum, where cybersecurity is not a consideration at all, to the opposite end where the...more
EDRM Ripped From the Headlines Webinar Series:
In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the Practice at the University of Maryland and James and Jack Dever, cyber attorneys...more
8/9/2022
/ Archived Data ,
Cell Phones ,
Data Deletion ,
Department of Defense (DOD) ,
Department of Homeland Security (DHS) ,
e-Discovery Professionals ,
Electronically Stored Information ,
Record Retention ,
Risk Mitigation ,
Secret Service ,
Surveillance ,
Telecommunications ,
Text Messages ,
Webinars