Latest Publications

Share:

From Campus to Counsel: An Insider’s Perspective: What Law Firms Look for in the On-Campus Interview [Video]

The From Campus to Counsel Podcast is designed to help law students as they navigate the on-campus interview process. Join us as we dive into the inner workings of on-campus recruiting, from researching law firms and...more

From Campus to Counsel: Applying and Prepping for On-Campus Interviews [Video]

The From Campus to Counsel Podcast is designed to help law students as they navigate the on-campus interview process. Join us as we dive into the inner workings of on-campus recruiting, from researching law firms and...more

No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel [Video]

Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to...more

SEC Showers Down Proposed Cybersecurity Rules: 5 Steps for Staying Dry

It’s rainy season for proposed SEC cybersecurity rules. The first watershed was proposed regulations targeting investment companies’ and advisers’ cybersecurity preparedness. See “SEC Plants New Cybersecurity Regulations;...more

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs [Video]

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more

COVID-19 Class Action Heat Map Shows More Than 2,800 Pandemic-Related Putative Class Actions

More than 2,800 putative class actions have been filed in the United States related in some way to the COVID-19 pandemic, according to our research of publicly available dockets. The most common claims are by consumers for...more

No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else [Video]

Larry Whiteside Jr. is the President and Director of Cyversity, an organization whose mission is to achieve consistent representation of women and underrepresented minorities in the cyber industry through programs designed to...more

Four Takeaways From the SEC's Proposed Cyber Rule for Public Companies

On March 9, the Securities and Exchange Commission (SEC) published a proposed rule, File No. S7-09-22, that would significantly impact public companies' cybersecurity reporting obligations. Among other things, the rule would...more

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People [Video]

Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. A kindhearted introvert who began his cybersecurity career in the Army and then the U.S. Coast...more

Record Class Action Caseloads, Impacts of COVID-19 Among Findings in 2022 Class Action Survey

Carlton Fields is pleased to share its 11th annual Class Action Survey, which provides an overview of important issues and practices related to class action matters and management. This annual publication reports on...more

[Webinar] 2022 Class Action Survey Results - March 15th, 12:00 pm - 1:00 pm ET

The 2022 Carlton Fields Class Action Survey reveals that companies with class actions are seeing increases in the number of class actions they face at a given time. The current portfolio reveals the highest number of both...more

No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader [Video]

Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into...more

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure [Video]

Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick,...more

No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

FTC Sharpens Its Cyber Enforcement Tool by Amending and Expanding the Safeguards Rule

In the culmination of a process that began in 2016, the Federal Trade Commission (FTC) last week issued a final rule to amend the Standards for Safeguarding Customer Information under the Gramm-Leach-Bliley Act. The...more

No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Cyber Threat Intelligence Analyst Who Is an Expert on Social Media Trolls [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

CF on Cyber: The Anatomy of a Ransomware Attack - Part 2 [Video]

In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks. Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer...more

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1 [Video]

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more

Credential Stuffing: Where Passwords Go When They Are Stolen and Some Strategies for Defense and Incident Response

Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more

Get Your House in Order: Four Steps to Take Now to Prepare for Ransomware

With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more

No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An SOC Technical Manager Who Builds Things With Keyboards and Blowtorches... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An OSINT Expert Who Credits Much of Her Success to Her Improv Comedy Skills... [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

129 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide