No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
No Password Required Podcast: Chief Product Officer at ThreatLocker and Advocate of Buc-ee’s, Mascots, and Buc-ee Mascots
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Life With GDPR: Critical Perspectives on Big Law Firm Cybersecurity
In a decision on immaterial damages under Article 82 of the EU General Data Protection Regulation (GDPR), the Higher Regional Court of Dresden, Germany (case number 4 U 940/24), set out important monitoring and auditing...more
A Jan. 13 decision out of the U.S. Court of Appeals for the Sixth Circuit is one more nail in the coffin of "silent cyber." In Home Depot Inc. v. Steadfast Insurance Co., the federal appellate court agreed with the lower...more
Recent reports concerning a potential security incident involving Oracle Cloud services provide a warning for many companies who allow third parties to access or store sensitive company data. A threat actor claims to have...more
Recently, we had the opportunity to advise some clients who worked with a third-party vendor that maintained custody of personal information pertaining to our clients’ respective end users. The vendor suffered a data breach...more
In Home Depot Inc. v. Steadfast Insurance Co., Home Depot learned the hard way a rule every DIY enthusiast knows: measure twice, cut once. It appears Home Depot’s measurements were off when it sized up its insurance needs,...more
Part 1: 5 Essential safeguards for website operators - In the rapidly evolving world of artificial intelligence, data scraping is a hot topic. The copying of online text, images and videos has beneficial use cases (e.g....more
Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five...more
Deal structure matters, particularly in bankruptcy. The Third Circuit recently ruled that a creditor’s right to future royalty payments in a non-executory contract could be discharged in the counterparty-debtor’s bankruptcy....more
When a party fails to comply with a condition precedent, especially if such a provision includes a time limit for the fulfilment of the obligation, it will often advance various arguments to avoid the consequences of...more
When negotiating technology or data services contracts, businesses of all sizes and industries are now spending more time and attention on privacy controls. The increasing prevalence of comprehensive U.S. state privacy laws...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more
Security Schedules, Privacy Addenda, TOMs, DPAs—whatever you call them, privacy and cybersecurity contract terms have exploded in prevalence in recent years, bringing with them new importance that can lead to difficult and...more
If you know music, you know Van Halen. The Hall of Fame rock band turned out several hit singles and was known for their virtuoso guitar riffs, great hair, lavish lifestyles, and a penchant for M&M candies. That’s right,...more
Business as (un)-usual after Covid? As we emerge from the pandemic, it is becoming increasingly clear that planning and working for a return to business as usual will not be enough. To survive in the marketplace, careful...more
The Impact of COVID-19 on Businesses - The impact of COVID-19 has been sharp and swift — the effect has been felt in most industries around the world. Singapore, while leading the pack in its response to COVID-19, has not...more
As of January 1, 2020, California became the first state to permit residents whose personal information is exposed in a data breach to seek statutory damages between $100-$750 per incident, even in the absence of any actual...more
I continuously confront vendors who say I am “the only” lawyer who objects to limitation of liability provisions that attempt to limit the liability of a security incident to the amount of the contract....more
In light of a recent Wipro data breach, Wipro’s customers should move quickly to take operational and contractual precautions to help minimize the breach’s potential effects on their organizations. Wipro, the India-based...more
It’s your worst nightmare. All of your most important and sensitive data, the thing your business values most, the thing your company cannot operate without, the thing your regulators require you to protect, has been taken...more
Cybersecurity company Carbon Black recently issued are port of the results of a survey of chief information security officers (CISOs) of financial organizations, which showed that the financial industry is getting hammered by...more
A federal district court in the Eastern District of Pennsylvania recently issued a prescient opinion upholding traditional contract principles in this fast-moving technological age of electronic financial transmissions. ...more
The Toronto Sun reported this morning that the privacy of 4,500 consumers of recreational cannabis in Ontario has been compromised. The names and addresses of individuals purchasing cannabis through the Ontario Cannabis Store...more
Management of electronic health records (EHR) is a complicated yet necessary task in the modern practice of medicine. To reduce the administrative burden of managing EHR records, many physicians and other healthcare...more