No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Podcast: How Can Companies in the Health Care and Life Sciences Industries Strengthen Their Cybersecurity Posture? - Diagnosing Health Care
Crypto Exchanges Launch Institutional Platform, LATAM Stablecoin - A major U.S. cryptocurrency exchange recently announced the launch of an institutional platform “aimed at institutions, asset managers, hedge funds and...more
Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more
The Federal Energy Regulatory Commission (FERC) announced on July 19, 2018, that it is directing the North American Electric Reliability Corporation (NERC) “to develop and submit modifications to the NERC Reliability...more
Russian Hackers Penetrated Networks of U.S. Electric Utilities - "Russian hackers gained access to the networks of U.S. electric utilities last year, which could have allowed them to cause blackouts, according to federal...more
In January of this year, Chinese wind turbine manufacturer Sinovel Wind Group Co. Ltd. was convicted of stealing trade secrets from U.S. company AMSC Inc. ...more
The Federal Energy Regulatory Commission (FERC) has proposed new rules to enhance cybersecurity for the electric grid in the U.S., which includes security management controls to specifically respond to risks associated with...more
Energy and Critical Infrastructure Industries Warned of Increased Attacks by FBI and DHS - The FBI and Department of Homeland Security issued a joint statement on October 20, 2017 warning of an increased danger of a...more
Managing Decommissioning Risks in Asian M&A Transactions - By the end of 2026, approximately 134 producing Concessions and Production Sharing Contracts (each, a “PSC”) will have expired in South Asia. It is expected that 900...more
On July 20, 2017, the National Academies of Sciences, Engineering, and Medicine (NASEM) released a report directing the U.S. Department of Energy (DOE) and the U.S. Department of Homeland Security (DHS) to develop solutions...more
On December 7, 2016, the Department of Energy (DOE) issued proposed procedures that would govern emergency orders issued by the Secretary of DOE, following the president’s declaration of a Grid Security Emergency. These...more