Latest Publications

Share:

Do You Know Who Your Employee Is? Mitigating DPRK IT Worker Risk

North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more

Trust and National Security: Lessons for Business Insider Threat Programs

The recent arrest and criminal charges against Airman First Class Jack Teixeira for the alleged posting of classified and sensitive information on social media is yet another example of the significant risk that trusted...more

THE INSIDER THREAT: Mitigating Risk Within the DNA of Your Organization

Understanding and managing insider risks is not a new discipline. The manifestation of insider-related risks can be disastrous but the fact that these events are caused by people inside an organization rarely receives enough...more

Reducing Regulatory Exposure: The Priceless Cyber Question

Given recent regulatory activity and sentiments, companies must take an active role in maturing their cybersecurity programs so that they robustly counter potential risk. Current and future regulator activity, rulemaking, and...more

CFIUS: Three Trends to Know

Foreign direct investment regimes, including CFIUS, regularly review transactions to assess potential risks to national security. What should organizations know about key trends behind a potential CFIUS review?...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide