Forensic Update

Reflections on information management within the legal and regulatory arena

Privacy + Security Forum…

Posted by Johnny Lee on August 31, 2017

Excited to represent Grant Thornton LLP and join Daniel Solove, Edward R. McNicholas, Jon Neiditz, Mauricio Paez, Liisa Thomas, Amanda Witt and a host of other luminaries and all-stars at the 2017 Privacy+Security Forum in Washington DC…

https://privacyandsecurityforum.com/

Advertisements

Posted in Computer Forensics, CyberSecurity, Data Breach, Data Governance, ECM, eDiscovery, Information Security, Privacy | Leave a Comment »

Your move Schrödinger…

Posted by Johnny Lee on July 24, 2017

Posted in eDiscovery | Leave a Comment »

Test your systems to avoid embarrassment…

Posted by Johnny Lee on June 9, 2017

Before advancing undue burden arguments about being unable to find key documents, you may want to test your systems to avoid embarrassment…

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Litigation Hold, Records Retention | Leave a Comment »

Separated by a common language…

Posted by Johnny Lee on April 13, 2017

[1] Board to CISO: Can we bounce back from a breach?

 

[2] CISO to Board: Unlikely…we need money & a LOT of work done immediately.

 

[3] What the Board hears…

Posted in eDiscovery | Leave a Comment »

One of my all-time favorites…

Posted by Johnny Lee on March 27, 2017

Posted in Announcement | Leave a Comment »

Design…test…repeat.

Posted by Johnny Lee on February 13, 2017

rxwseWe all work with model employees…none of them would ever knowingly flout policy…just the same, it’s a good idea to test the theory. #InfoSec

Posted in eDiscovery | Leave a Comment »

Well…that’s one way to secure the Internet of Things.

Posted by Johnny Lee on January 7, 2017

FTC brings its third action against #IoT hardware manufacturers, as it sues D-Link for flaws in routers and internet cameras that purportedly resulted in consumers’ privacy being at risk.

D-Link joins Asus and TRENDnet as FTC targets under a theory of unfairness in violation of Section 5 of the FTC Act.

http://ow.ly/XMCm100y21t

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Minimize Business Email Compromise risk in 6 steps…

Posted by Johnny Lee on December 11, 2016

…a mix of training, process & technology to strengthen controls.gt_logo

ow.ly/Gqzx304SvS0

Posted in CyberSecurity, Data Breach, Data Governance, ECM, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

What can we learn from the rash of revelations related to sizable hacks in 2012?

Posted by Johnny Lee on September 9, 2016

bitglass_wheres_your_data_thumbnail1Posit the research, which indicates that the average length of an un-detected compromise is in excess of 200 days. Couple that with research from security outfit Bitglass, and you’ve got some shocking correlations that put 2012 into a broader perspective.

That experiment employed data-tracking technology to track the traverse of sensitive data on the dark web post-compromise.
The upshot: In 12 days, these data were access 1,100 times within 22 countries, with two different cyber-crime syndicates sharing data with their peers…imagine how often compromised 2012 data changed hands over 4 years!

Bitglass Research

Posted in Computer Forensics, Data Governance, eDiscovery, Fraud, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

Holistic CyberSecurity Management…

Posted by Johnny Lee on July 14, 2016

Holistic CyberSecurity Management…

“Taking AIM at Cyber Risk” is the latest publication from Grant Thornton that articulates a vision of how to strategically address how organization should deal with the most serious business threats associated with CyberSecurity.

http://gt-us.co/29EjDJT

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

 
%d bloggers like this: