No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
Fintech Focus Podcast | Responding to a Cyber Attack – Key Considerations for GCs and CISOs
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Justice Insiders Podcast - Human Beings: Cybersecurity's Most Fragile Attack Surface
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
2023 DSIR Deeper Dive: State Privacy and Data Collection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
No Password Required: Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a Guy With a Mildly Exciting Expense Account
Compliance & Disaster Preparedness
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 157: Sarah Glover, Maynard Nexsen Cybersecurity Attorney
Overview of Cybersecurity in Government Contracts
Episode 282 -- CISO and CCOs -- The Evolving Partnership
This is the fifth article in Womble Bond Dickinson’s Energy & Natural Resources thought leadership series titled “Going Nuclear: A Sustainable Solution to Rising Energy Demand.” The series will explore the changing landscape...more
After 13 years, the Nuclear Regulatory Commission has issued revised guidance for cybersecurity programs for nuclear power reactors. All nuclear power reactor owners must review the NRC’s latest guidance and confirm their...more
The U.S. Department of Justice (DOJ) unsealed indictments against four Russian government officials on March 24, 2022, alleging that they hacked into networks that controlled energy systems in the U.S....more
The NRC held a public meeting on March 4 to discuss the issuance for public comment of draft regulatory guide (DG) DG-5061, Revision 1, Cyber Security Programs for Nuclear Power Reactors. DG-5061, Revision 1 would revise...more
Why Everything They Say About California Fires — Including That Climate Matters Most — is Wrong - "'We’ve looked at the history of climate and fire throughout the whole state, and through much of the state, particularly...more
Nuclear Power Corporation of India Limited (NPCIL) announced on October 30 that the malware “Dtrack” had been found on the administrative network of the Kudankulam Nuclear Power Plant (KKNPP) in early September 2019. KKNPP is...more
On Tuesday, July 31, 2018, the Department of Homeland Security (DHS) hosted a National Cybersecurity Summit, featuring the nation's top homeland, national security and law enforcement officials. The event featured Vice...more
This is the first installment of a two-part series exploring how critical infrastructure like power plants are proactive in implementing protective measures to safeguard against future cyber attacks, but challenges remain....more
On May 23, 2018, the U.S. Department of Justice ("DOJ") publicly announced its seizure of botnet infrastructure used by malware dubbed "VPNFilter." DOJ indicated that the sophisticated malware was linked to APT 28, the group...more
On July 20, 2017, the National Academies of Sciences, Engineering, and Medicine (NASEM) released a report directing the U.S. Department of Energy (DOE) and the U.S. Department of Homeland Security (DHS) to develop solutions...more
A report from the FBI and the Department of Homeland Security warns of malware attacks targeting mainly nuclear power stations and energy facilities. The attacks started in May of this year....more
It’s scary to think about, but anything that is online is hackable. Including critical infrastructure like nuclear power plants. It has been reported that U.S. authorities are investigating a cyber intrusion that has hit...more
Because cyber risk presents a “unique concern” in the energy sector, the World Energy Council has issued a new report entitled “The Road to Resilience: Managing Cyber risks,” to its industry leaders....more
A representative of Honeywell Process Solutions (Honeywell), which provides cybersecurity services for over 400 industrial sites worldwide, recently commented publicly that Honeywell is seeing an increase in nation-state and...more
On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more
Order will create a voluntary Cybersecurity Framework for designated critical infrastructure within a year. On February 12, President Barack Obama signed an executive order directing the Department of Homeland Security...more