North Korean IT operatives are infiltrating U.S. and Western companies using stolen or fabricated identities, VPNs, and U.S.-based co-conspirators to gain unauthorized access to corporate systems. These insider threats pose...more
2/19/2025
/ Bad Actors ,
Co-Conspirators ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Fraud ,
Information Technology ,
Insider Information ,
National Security ,
North Korea ,
Office of Foreign Assets Control (OFAC) ,
Popular ,
Risk Assessment ,
Risk Management ,
Sanctions
The recent arrest and criminal charges against Airman First Class Jack Teixeira for the alleged posting of classified and sensitive information on social media is yet another example of the significant risk that trusted...more
5/10/2023
/ Classified Information ,
Competition ,
Compliance ,
Employee Training ,
Incident Response Plans ,
Information Security ,
Information Technology ,
Internal Controls ,
National Security ,
Threat Management ,
Trade Secrets
Understanding and managing insider risks is not a new discipline. The manifestation of insider-related risks can be disastrous but the fact that these events are caused by people inside an organization rarely receives enough...more
3/13/2023
/ Analytics ,
Corporate Governance ,
Corruption ,
Customer Proprietary Network Information (CPNI) ,
Cyber Crimes ,
Cybersecurity ,
Ethical Standards ,
Incident Response Plans ,
Individual Accountability ,
Leadership ,
Misappropriation ,
Risk Assessment ,
Risk Management ,
Whistleblowers
Given recent regulatory activity and sentiments, companies must take an active role in maturing their cybersecurity programs so that they robustly counter potential risk. Current and future regulator activity, rulemaking, and...more
Foreign direct investment regimes, including CFIUS, regularly review transactions to assess potential risks to national security. What should organizations know about key trends behind a potential CFIUS review?...more
5/20/2022
/ CFIUS ,
Critical Infrastructure Sectors ,
Cross-Border Transactions ,
Emerging Technology Companies ,
FIRRMA ,
Foreign Acquisitions ,
Foreign Investment ,
National Security ,
Personal Data ,
Sensitive Personal Information ,
U.S. Treasury