Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Justice Insiders Podcast - Human Beings: Cybersecurity's Most Fragile Attack Surface
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection
2023 DSIR Deeper Dive: State Privacy and Data Collection
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
No Password Required: Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a Guy With a Mildly Exciting Expense Account
Compliance & Disaster Preparedness
Taking the Pulse, A Health Care and Life Sciences Video Podcast | Episode 157: Sarah Glover, Maynard Nexsen Cybersecurity Attorney
Overview of Cybersecurity in Government Contracts
Episode 282 -- CISO and CCOs -- The Evolving Partnership
No Password Required: Threat Researcher at Cisco Talos and a Veteran of the Highest-Profile Cyber Incidents Who Roasts His Own Coffee Beans
Innovation in Compliance - Cybersecurity Today and Tomorrow with Patrick Hynds
Innovation in Compliance - The Role of Backup Systems in Cybersecurity Defense with Curtis Preston
Efforts to Address the Lack of Federal Data Privacy Legislation in the U.S. Have Continued - The need for federal data privacy legislation was reiterated in the House Energy and Commerce Committee’s Subcommittee on...more
Last week, the U.S. Senate passed S. 3600, the Strengthening American Cybersecurity Act, which represents a significant step forward in the establishment of a national data breach notification law for certain critical...more
Hackers who targeted airport currency exchange mainstay Travelex in a ransomware attack on New Year’s Eve have alerted British media that they possess 5 GB of sensitive customer data from the company “since gaining access to...more
In a legislative environment charitably described as challenging, the fact that the Senate recently passed cybersecurity legislation by unanimous consent is noteworthy and highlights the bipartisan nature of this issue. The...more
We reported last week that a spyware maker recently compromised users’ and victims’ sensitive information. Since that time, another spyware maker, mSpy, which holds itself out as having over a million users employing its...more
After weeks of discussion and procedural uncertainty, the U.S. House of Representatives passed new legislation by a vote of 419–3 that, if enacted into law, will strengthen existing sanctions against Russia and also impose...more
On May 2, the U.S. House Committee on Science, Space, and Technology unanimously approved H.R. 2105, the “NIST Small Business Cybersecurity Act of 2017.” The Senate Commerce, Science, and Transportation Committee reported...more
On January 10, 2017, Senate Republicans and Democrats introduced bi-partisan legislation called the “Countering Russian Hostilities Act of 2017,” which would impose broad sanctions on Russia. The Act would codify the...more
On December 1, 2015, the U.S. House of Representatives passed a revised Intelligence Authorization Act. The White House had threatened to veto a previous version of the bill, but proponents of the passed version say that...more
On October 27, 2015, the Senate passed S. 754, the Cybersecurity Information Sharing Act of 2015 (“CISA”), which addresses how companies can share cyber threat information with the federal government. The legislation aims to...more
After a long delay, with a vote of 74 to 21, the United States Senate passed the Cybersecurity Information Sharing Act (CISA) on October 27, 2015. The bill has been touted as being controversial and is opposed by...more
It seems as if every day there is a new report of a data breach or cyber attack. For the same reason that Willie Sutton robbed banks — “because that’s where the money is” — cyber criminals have been incessant in their...more
Leading the News - Libya: On October 8th, The Washington Post provided an update on the Islamic State of Iraq and the Levant’s (ISIL) activities in Sirte, Libya. Since taking hold of Sirte earlier this year, ISIL...more
On October 6, 2015, the U.S. House of Representatives passed the Department of Homeland Security Cybersecurity Strategy Act of 2015 (the “Cybersecurity Strategy Act”), which, if enacted, would require the Department of...more
Add dating website Ashley Madison to the list of large companies like Target, Home Depot and Michael’s that have had customer information stolen by hackers. Published reports say Ashley Madison is now facing multiple lawsuits...more
While the U.S. House of Representatives has already adjourned for the month-long August recess, the U.S. Senate remains in session and could take up a measure to address cybersecurity information-sharing as one of its last...more
The Senate Intelligence Committee on June 8th voted 12-3 to approve a cybersecurity bill authored by Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA). S. 2588, the...more