No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
No Password Required Podcast: Chief Product Officer at ThreatLocker and Advocate of Buc-ee’s, Mascots, and Buc-ee Mascots
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Life With GDPR: Critical Perspectives on Big Law Firm Cybersecurity
A Jan. 13 decision out of the U.S. Court of Appeals for the Sixth Circuit is one more nail in the coffin of "silent cyber." In Home Depot Inc. v. Steadfast Insurance Co., the federal appellate court agreed with the lower...more
We touch upon several topics in our September Insurance Update. We begin with two federal circuit court rulings on late notice – one involving a claims-made policy and the other an occurrence policy. In these cases, the...more
Our lives and the products and devices we use become more dependent on data by the day. As a result, cyberattacks and data breaches present everchanging risks to companies and individuals, and the importance of applicable...more
Cases in our April Insurance Update address several questions: •Are costs incurred to comply with a subpoena covered? •What must an insured show to rebut the presumption of prejudice in a late notice situation? •What...more
Along with seeking to analogize COVID-19 physical loss or damage to that in the fumes or contaminants context, policyholders are now also attempting to rely on cases discussing the bounds of physical loss or damage in the...more
Cyber attacks are now commonplace. Ransomware attacks, in particular, have skyrocketed in frequency and size. High-profile data breaches have cost businesses in the United States millions of dollars in losses and incalculable...more
"The overwhelming majority of courts have concluded that neither COVID-19 nor the governmental orders associated with it cause or constitute property loss or damage for purposes of insurance coverage." So concluded the...more
In our March Insurance Update, we discuss four state supreme court cases and four cybercrime cases. The state high courts address: •From whose perspective should a consent-to-settle provision be judged? •What standard...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
The State of California is once again leading the way with trying to keep up with technology and protecting consumers. Senate Bill 327 requires Internet of Things (IoT) developers to implement “reasonable security features”...more
Your company’s computer system has been compromised by a hacker. From your initial investigation, you discover that the hacker has accessed proprietary company information and customer information including Social Security...more
IN THE SPOTLIGHT - - SEC Sanctions Unregistered EB-5 Investments Broker SECURITIES - - FINRA to Assess Member Firms’ Culture - SEC Seeks Fund Responses to Distribution-In-Guise Guidance ...more
The computer network of a Five Guys Burger franchise, RVST Holdings, LLC (RVST), was hacked. Customers’ credit card information was stolen and used to make numerous fraudulent charges. Trustco Bank brought an action against...more
In recent years, there has been no shortage of news about large-scale data privacy breaches; incidents that have affected tens of millions of consumers nationwide. Those incidents have spurred a growing market for so-called...more