No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Life With GDPR: Critical Perspectives on Big Law Firm Cybersecurity
No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
2023 DSIR Deeper Dive: How International and Domestic Regulatory Enforcement Spotlights the Information Governance Tensions Between ‘There’ and ‘Here’ and Between ‘Keep’ and ‘Delete’
Marketing Minute with NP Strategy (Video): How to Respond to a Cyber Security Breach
Life With GDPR – Lessons Learned from The Singtel Opus Data Breach
State AG Pulse | CT AG Reacts to Genetic Data Breach
Cybersecurity in Video Games & Esports
2023 DSIR Deeper Dive: State Privacy and Data Collection
Organizations of all types are increasingly subject to data theft and loss, whether the asset is customer information, intellectual property, or sensitive company files. The federal government and, thus, its private...more
In the wake of Edward Snowden’s disclosures, the United States administration faced a daunting series of challenges on surveillance, cybersecurity, and privacy. Congress was reluctant to enact comprehensive legislation....more
This year has been a busy year for education law in the area of data privacy. Educational institutions continue to be a rich target for hackers. Additionally, there were some important developments in the interpretation of...more
It has been reported that the White House is investigating a hacking of the Gmail account of a contract worker who was working on the First Lady’s advance team responsible for logistics. The hacking included emails from...more
On October 30, the White House released a memorandum to the heads of federal departments and agencies detailing the Cybersecurity Strategy and Implementation Plan (“CSIP”), a proposal designed to update and bolster federal...more
On August 30, 2015, the Washington Post broke a story that the Obama administration is developing a package of economic sanctions that will target Chinese companies and individuals who have benefitted from cybertheft. The new...more
U.S. officials have blamed Chinese government-backed attackers for many of the recent cyber attacks on U.S. government and business computer networks: “Researchers and government officials have determined that the Chinese...more
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more
We’ve been talking potential bias in big data for some time now, and last week’s news was full of concerns about just that. The New York Times Upshot Blog interviewed a Microsoft computer scientist on the subject; NBC News...more
FCC Working Group Issues Report On Cybersecurity Best Practices – The June 2015 issue of the Intellectual Property & Technology Law Journal features an article by King & Spalding partner Steven Snyder on a Federal...more
Following a year of high-profile data breaches, the Securities and Exchange Commission (SEC) announced on January 13, 2015 that, for the second consecutive year, its Office of Compliance Inspections and Examinations (OCIE)...more
Although most states have enacted some form of data privacy and breach notification laws, and certain federal statutory schemes cover specific industry sectors, there are no privacy protections for all personal data. Given...more
In This Issue - White House Releases Proposed Privacy Legislation - Lessons from the Anthem Data Breach - SEC and FINRA Release Results of Industrywide Cybersecurity Examination Sweeps - COSO Releases Report on...more
In This Issue: - The President’s Plan for Securing Cyberspace - The President’s Plan for Safeguarding American Consumers and Families - Conclusion - Excerpt from The President’s Plan for Securing...more
The Obama Administration's handling of cyber and data security was recently brought into question due to two distinct security incidents. On the same day that a former Administration official received a subpoena related to...more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more