Latest Posts › Popular

Share:

No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who... [Video]

Jessica Gulick is a woman of many trades. She is the founder and CEO of the cyber marketing firm Katzcy, the founder and commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that...more

Verizon False Claims Act Settlement Signals DOJ’s Sustained Focus on Cybersecurity-Related Violations

On September 5, the Department of Justice (DOJ) settled allegations under the False Claims Act against Verizon Business Network Services LLC, a telecommunications provider. The settlement emphasizes the DOJ’s continued...more

Four Key Cybersecurity and Privacy Considerations for Organizations Using Generative AI

Generative AI has captured the public’s attention and promises to transform the way we live and work. The technology, however, implicates a number of important cybersecurity and privacy considerations for organizations. This...more

Gautam ‘Gotham’ Sharma – a cybersecurity consultant and comedian who injects fun into infosec  [Video]

Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co. In his training,...more

5/3/2023  /  Cybersecurity , Data Security , Popular

No Password Required: A Developer Advocate with Auth0 and an "Accordion Guy" with Rockstar Aspirations [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity [Video]

Andy Sekela is the Private Sector Coordinator for the FBI Tampa Division, who may just be on a mission to have the world’s coolest resumé. In this episode, Andy joins the No Password Required team to talk about his diverse...more

No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory [Video]

Hannah Sutor is the senior product manager at GitLab and digital privacy advocate at the Privacy Chick. Hannah joins the No Password Required team to talk about how she discovered privacy and cybersecurity in college, what...more

No Password Required: Senior Manager of Cybersecurity Analysis at Capital One and a Builder of the Most Rad Relationships in Cyber [Video]

Tashya Denose is a senior manager of cybersecurity analysis at Capital One and the director of brand and marketing at Black Girls in Cyber. In this episode, Tashya joins the No Password Required team to discuss her passion...more

No Password Required: The Former NSA Director and Storyteller Whose Life Resembles a Grisham Novel [Video]

Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to...more

SEC Showers Down Proposed Cybersecurity Rules: 5 Steps for Staying Dry

It’s rainy season for proposed SEC cybersecurity rules. The first watershed was proposed regulations targeting investment companies’ and advisers’ cybersecurity preparedness. See “SEC Plants New Cybersecurity Regulations;...more

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs [Video]

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. Before that, Dr. Dark worked in graduate and college...more

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure [Video]

Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick,...more

FTC Sharpens Its Cyber Enforcement Tool by Amending and Expanding the Safeguards Rule

In the culmination of a process that began in 2016, the Federal Trade Commission (FTC) last week issued a final rule to amend the Standards for Safeguarding Customer Information under the Gramm-Leach-Bliley Act. The...more

No Password Required: A Cyber Threat Intelligence Analyst Who Is an Expert on Social Media Trolls [Video]

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1 [Video]

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data...more

Credential Stuffing: Where Passwords Go When They Are Stolen and Some Strategies for Defense and Incident Response

Credential stuffing is a growing cyberattack method in which cybercriminals use a set of thousands of compromised user credentials, stolen from one company, to attempt a breach into another company’s secured system. It is...more

Get Your House in Order: Four Steps to Take Now to Prepare for Ransomware

With ransomware attacks surging, companies should evaluate their cybersecurity posture and harden their defenses. This could include working with a third-party security firm to audit the company's security and then follow-up...more

Biden Administration Issues Practical Guidance for Ransomware Attacks

On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware. The memorandum urged corporate executives and business leaders to...more

Florida's New Privacy Bill Promises Big Changes

Florida recently joined a small but growing number of states considering sweeping reforms to their data privacy and protection laws. House bill 969, titled “Consumer Data Privacy,” in many ways mirrors the California Consumer...more

The CCPA for the Land Title Industry: Practical Compliance With CCPA and New Privacy Laws [Video]

With the introduction of the CCPA in January 2020, many other U.S. states have also begun to consider their own proposed data privacy legislation. In this podcast, Elizabeth Reilly from Fidelity National Financial joins...more

California Consumer Privacy Act: A Reference Guide for Compliance

California passed a sweeping new privacy law that will impact many businesses. The California Consumer Privacy Act of 2018 (CCPA) is the first U.S. law to grant consumers extensive rights as to their personal information and...more

CF on Cyber: Key Takeaways from the California AG’s Proposed CCPA Regulations [Video]

On October 11, 2019, the California AG published its long-awaited proposed regulations to implement the CCPA. This podcast describes a few key points from those draft regulations, including as they relate to online privacy...more

Are Banks and Other Lenders Subject to the CCPA?

California’s new privacy statute imposes a number of new requirements on businesses that touch the personal information of California consumers. Its reach includes banks and financial services companies....more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide