Forensic Update

Reflections on information management within the legal and regulatory arena

  • Follow @ForensicUpdate

    Follow @ForensicUpdate

    Follow on Twitter

  • Follow @ Linked In

    Follow @ Linked In
  • Recent Tweets

    Error: Twitter did not respond. Please wait a few minutes and refresh this page.

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 18 other followers

Archive for the ‘eDiscovery’ Category

Your move Schrödinger…

Posted by Johnny Lee on July 24, 2017

Posted in eDiscovery | Leave a Comment »

Test your systems to avoid embarrassment…

Posted by Johnny Lee on June 9, 2017

Before advancing undue burden arguments about being unable to find key documents, you may want to test your systems to avoid embarrassment…

Posted in Computer Forensics, Data Governance, ECM, eDiscovery, Litigation Hold, Records Retention | Leave a Comment »

Separated by a common language…

Posted by Johnny Lee on April 13, 2017

[1] Board to CISO: Can we bounce back from a breach?

 

[2] CISO to Board: Unlikely…we need money & a LOT of work done immediately.

 

[3] What the Board hears…

Posted in eDiscovery | Leave a Comment »

Design…test…repeat.

Posted by Johnny Lee on February 13, 2017

rxwseWe all work with model employees…none of them would ever knowingly flout policy…just the same, it’s a good idea to test the theory. #InfoSec

Posted in eDiscovery | Leave a Comment »

Well…that’s one way to secure the Internet of Things.

Posted by Johnny Lee on January 7, 2017

FTC brings its third action against #IoT hardware manufacturers, as it sues D-Link for flaws in routers and internet cameras that purportedly resulted in consumers’ privacy being at risk.

D-Link joins Asus and TRENDnet as FTC targets under a theory of unfairness in violation of Section 5 of the FTC Act.

http://ow.ly/XMCm100y21t

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

What can we learn from the rash of revelations related to sizable hacks in 2012?

Posted by Johnny Lee on September 9, 2016

bitglass_wheres_your_data_thumbnail1Posit the research, which indicates that the average length of an un-detected compromise is in excess of 200 days. Couple that with research from security outfit Bitglass, and you’ve got some shocking correlations that put 2012 into a broader perspective.

That experiment employed data-tracking technology to track the traverse of sensitive data on the dark web post-compromise.
The upshot: In 12 days, these data were access 1,100 times within 22 countries, with two different cyber-crime syndicates sharing data with their peers…imagine how often compromised 2012 data changed hands over 4 years!

Bitglass Research

Posted in Computer Forensics, Data Governance, eDiscovery, Fraud, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

Holistic CyberSecurity Management…

Posted by Johnny Lee on July 14, 2016

Holistic CyberSecurity Management…

“Taking AIM at Cyber Risk” is the latest publication from Grant Thornton that articulates a vision of how to strategically address how organization should deal with the most serious business threats associated with CyberSecurity.

http://gt-us.co/29EjDJT

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

What In-House Counsel should know about CyberSecurity Information Sharing…

Posted by Johnny Lee on July 8, 2016

What In-House Counsel should know about CyberSecurity Information Sharing…

HT: Christina Ayiotis

Corporate Counsel

http://ow.ly/sxHL3022WQb

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Federal court rules P.F. Chang’s isn’t

Posted by Johnny Lee on June 9, 2016

Federal court rules P.F. Chang’s isn’t covered under a cyber-insurance policy for MasterCard assessments levied…

http://ow.ly/gjeJ3015lJD

Posted in eDiscovery | Leave a Comment »

.Symantec 2016 Report reveals phishing c

Posted by Johnny Lee on May 6, 2016

.Symantec 2016 Report reveals phishing campaigns target small businesses 43% of time…

http://ow.ly/4niE8J http://ow.ly/i/iYQks

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

 
%d bloggers like this: