Forensic Update

Reflections on information management within the legal and regulatory arena

  • Follow @ForensicUpdate

    Follow @ForensicUpdate

    Follow on Twitter

  • Follow @ Linked In

    Follow @ Linked In
  • Recent Tweets

    Error: Twitter did not respond. Please wait a few minutes and refresh this page.

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 18 other followers

Archive for the ‘CyberSecurity’ Category

Well…that’s one way to secure the Internet of Things.

Posted by Johnny Lee on January 7, 2017

FTC brings its third action against #IoT hardware manufacturers, as it sues D-Link for flaws in routers and internet cameras that purportedly resulted in consumers’ privacy being at risk.

D-Link joins Asus and TRENDnet as FTC targets under a theory of unfairness in violation of Section 5 of the FTC Act.

http://ow.ly/XMCm100y21t

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Minimize Business Email Compromise risk in 6 steps…

Posted by Johnny Lee on December 11, 2016

…a mix of training, process & technology to strengthen controls.gt_logo

ow.ly/Gqzx304SvS0

Posted in CyberSecurity, Data Breach, Data Governance, ECM, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

Holistic CyberSecurity Management…

Posted by Johnny Lee on July 14, 2016

Holistic CyberSecurity Management…

“Taking AIM at Cyber Risk” is the latest publication from Grant Thornton that articulates a vision of how to strategically address how organization should deal with the most serious business threats associated with CyberSecurity.

http://gt-us.co/29EjDJT

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

What In-House Counsel should know about CyberSecurity Information Sharing…

Posted by Johnny Lee on July 8, 2016

What In-House Counsel should know about CyberSecurity Information Sharing…

HT: Christina Ayiotis

Corporate Counsel

http://ow.ly/sxHL3022WQb

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

.Symantec 2016 Report reveals phishing c

Posted by Johnny Lee on May 6, 2016

.Symantec 2016 Report reveals phishing campaigns target small businesses 43% of time…

http://ow.ly/4niE8J http://ow.ly/i/iYQks

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

CyberSecurity & Internal Controls Frameworks…

Posted by Johnny Lee on December 8, 2015

CyberSecurity & Internal Controls Frameworks…

Happy to have contributed to @ComplianceWeek piece on #CyberSecurity & Internal Controls Frameworks.

http://ow.ly/T2UCp

HT: @tammywh

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Chinese government claims OPM hackers were arrested…

Posted by Johnny Lee on December 3, 2015

#ImportantIfTrue

http://wapo.st/1IpzOIz

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

New species of data breach tort…

Posted by Johnny Lee on October 6, 2015

New species of data breach tort…

As predicted, new tort law creature may soon be born: “negligent data security.”

http://ow.ly/SLjMk

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

CyberSecurity & the Audit Committee…

Posted by Johnny Lee on September 1, 2015

CyberSecurity & the Audit Committee…

New thought leadership from Grant Thornton on the important role that the Audit Committee plays in a defensible, sustainable, long-term CyberSecurity strategy.

http://ow.ly/RlLHR

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Simplifying Cyber-Security Controls amid Abundant Laws…

Posted by Johnny Lee on August 3, 2015

Simplifying Cyber-Security Controls amid Abundant Laws…

Check out this solid piece from Joe Mont [ @josephmont ], staff writer for ComplianceWeek on “How to Simplify Cyber-Security Controls Amid Abundant Laws.” I enjoyed the interview, and kudos on turning out an insightful piece.

http://ow.ly/PKewj

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

 
%d bloggers like this: