No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
2022 DSIR Deeper Dive: NFTs
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
The SEC did not take its foot off the pedal in fiscal year (FY) 2024 when it came to prosecuting insider trading. In the third installment of Season's Readings, we consider several recent actions in which the agency secured...more
Last week the Securities and Exchange Commission filed an enforcement action against nine defendants related to its 2017 discovery that its Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system used for receiving...more
As cybersecurity attacks have continued to gain prominence as a threat posing critical risk management and compliance challenges for financial institutions, the Securities and Exchange Commission (SEC) has emerged as an...more
AT&T has dropped plans to sell the Mate 10—the newest smartphone from China’s Huawei Technologies—just before the partnership was to be announced. AT&T gave no reasons for its abrupt reversal, but lawmakers have recently...more
EXECUTIVE SUMMARY - 1. Cybersecurity threats. Cybersecurity preparedness is essential in 2018 as the risk of, and associated adverse impact of, breaches continue to rise. The past year redefined the upward bounds of the...more
The U.S. Securities and Exchange Commission has signaled that it expects to issue updated guidelines on reporting cybersecurity incidents. “I think this issue is important enough, wide-ranging enough that we should tackle...more
Federal oversight related to hacking recently made headlines when a federal court in New Jersey granted the Securities and Exchange Commission’s (SEC’s) motion to freeze assets connected to a hedge fund manager accused of...more
In an action that emphasizes the agency’s commitment to cybersecurity, the SEC recently charged 32 defendants with violations of the federal antifraud laws and corresponding SEC rules, stemming from an alleged $100 million...more
Cyber security is a key focus for virtually everyone these days. The SEC, for example, has been issuing releases discussing disclosure requirements and offering guidance for a number of years. Prominent issuers have reported...more