Guidepost in Motion: Off The Chain Part 2 Innovations and Best Practices in Crypto and Blockchain
Cyberside Chats: Don’t silo your risk from legal (with Ingrid Rodriguez)
Digging Deeper Episode 10: Misguided or Misconduct? Understanding Bad Behavior in the Corporate World
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 6: Teams Channels – The virtual collaboration workspace
M365 in 5 – Part 5: Teams Chats – Modern communications
M365 in 5 – Part 4: Teams – An introduction to collaboration
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
M365 in 5 – Part 1: Exchange Online – Not just a mailbox
Sitting with the C-Suite: Differentiating Through Client Service
Sitting with the C-Suite: Culture Integration in a Remote Work Environment
Sitting with the C-Suite: HaystackID and NightOwl Merger Overview
Sitting with the C-Suite: Managing through Challenging Times? Focus on the Key Three
Nota Bene Episode 91: China Q3 Check In - Trade Wars, GDP Growth, Pandemic Comparatives, and Hong Kong with Michael Zhang
Sitting with the C-Suite: COVID 19 Impact – Four Sectors of Change for the Legal Industry
Sitting with the C-Suite: Legal Industry Technology Adoption
Sitting with the C-Suite: Trial Prep as a Launchpad for Services
Sitting with the C-Suite: eDiscovery Observations – Historical Lookback to 1990s and 2000s
Sitting with the C-Suite: Servient – What’s Next
Cybersecurity is integral to protecting sensitive information, ensuring regulatory compliance, managing financial risks, maintaining reputation, ensuring business continuity, gaining a competitive advantage, adapting to...more
According to Cybersecurity Ventures, cybercrime is the fastest growing crime in the U.S., with damages expected to reach $6 trillion globally by 2021. Therefore, it is axiomatic that C-Suites continue to address the risk...more
Verizon released its 2019 Data Breach Investigation Report (DBIR) on May 8th. The widely read annual report is considered a primary source for data breach trends, statistics and forecasts. This year’s report is based on data...more
In 2013 alone, the U.S. Department of Homeland Security (DHS) and its Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to more than 256 cyber-incident reports—more than half of them in the energy...more
The 2015 US State of Cybercrime survey has been released and is worth a read. The Survey, co-sponsored by PwC, CSO, the CERT Division of the Software Engineering Institute at Carnegie Mellon University and the United States...more
We (and others) often comment on the Federal Trade Commission’s (FTC) increased enforcement activity of data security issues, particularly with the Wyndham and LabMD cases, and the fact that it is enforcing data security...more