Sedona Conference Just Leveled the Playing Field with Reasonable Security
To the corporate CISO cybersecurity breaches are a one-two punch. The first punch is, of course, the attack or mistake that caused the breach. Nobody wants to be caught unprepared, or to be the cause of harm to anyone who may be exposed by a breach. The second punch, so say the statistics, is the more damaging one. (more…)
Half of Your Cybersecurity Adversaries Just Disappeared
It’s fair to say that two adversaries contribute to the costs of cybersecurity incidents: the attackers and the lawyers. On February 16 the lawyers became your allies. (more…)
The Limits of Cybersecurity Benchmarking
Quick: Where do you go to find the cost-per-record of a data breach? Reports from the Ponemon Institute? The annual Verizon Data Breach Investigations Report? How about the NetDiligence Cyber Claims Study? These are all credible and popular sources for breach cost benchmarking, but they give drastically different answers to the question. (more…)
2021 Cyber Trends
While large-scale transitions to our business environments changed in 2020 due to the COVID outbreak and implementation of remote work strategies, we are still forecasting how to create an adaptable security plan for the near future. Many are probably more than ready to move on to 2021 as quickly as possible, while hoping for a more stable (more…)
New Interim Rule Requires CMMC Self-Assessment by November 30, 2020
There is a new deadline that Department of Defense (DOD) contractors and vendors need to be aware of. The deadline concerns Cybersecurity Maturity Model Certification (CMMC). (more…)
National Foundation for Judicial Excellence
THE EVENT
2020 Annual Judicial Symposium. Law in the New Age: How Automation and Artificial Intelligence Will Change Judging in Substance and Procedure
Why Sensitive Data Scanning is so Important Today
Organizations have a lot of data; more than we realize, and it continues to grow.
Each day, we create and store all this data in our systems then pack it up and save it somewhere – just to put it away, even temporarily… until it is needed. The challenge is how to easily manage, categorize, and locate specific information (more…)
Threat Forecasting – Using Open Source Data to Foresee Your Next Breach
We forecast cybersecurity threats and events not to predict the future, but to change it. Regulators and litigators all hold us accountable for knowing foreseeable threats so we can avoid them. But what is foreseeable? (more…)