Forensic Update

Reflections on information management within the legal and regulatory arena

Design…test…repeat.

Posted by Johnny Lee on February 13, 2017

rxwseWe all work with model employees…none of them would ever knowingly flout policy…just the same, it’s a good idea to test the theory. #InfoSec

Advertisements

Posted in eDiscovery | Leave a Comment »

Well…that’s one way to secure the Internet of Things.

Posted by Johnny Lee on January 7, 2017

FTC brings its third action against #IoT hardware manufacturers, as it sues D-Link for flaws in routers and internet cameras that purportedly resulted in consumers’ privacy being at risk.

D-Link joins Asus and TRENDnet as FTC targets under a theory of unfairness in violation of Section 5 of the FTC Act.

http://ow.ly/XMCm100y21t

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Minimize Business Email Compromise risk in 6 steps…

Posted by Johnny Lee on December 11, 2016

…a mix of training, process & technology to strengthen controls.gt_logo

ow.ly/Gqzx304SvS0

Posted in CyberSecurity, Data Breach, Data Governance, ECM, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

What can we learn from the rash of revelations related to sizable hacks in 2012?

Posted by Johnny Lee on September 9, 2016

bitglass_wheres_your_data_thumbnail1Posit the research, which indicates that the average length of an un-detected compromise is in excess of 200 days. Couple that with research from security outfit Bitglass, and you’ve got some shocking correlations that put 2012 into a broader perspective.

That experiment employed data-tracking technology to track the traverse of sensitive data on the dark web post-compromise.
The upshot: In 12 days, these data were access 1,100 times within 22 countries, with two different cyber-crime syndicates sharing data with their peers…imagine how often compromised 2012 data changed hands over 4 years!

Bitglass Research

Posted in Computer Forensics, Data Governance, eDiscovery, Fraud, Information Security, Investigations, Privacy, Records Retention | Leave a Comment »

Holistic CyberSecurity Management…

Posted by Johnny Lee on July 14, 2016

Holistic CyberSecurity Management…

“Taking AIM at Cyber Risk” is the latest publication from Grant Thornton that articulates a vision of how to strategically address how organization should deal with the most serious business threats associated with CyberSecurity.

http://gt-us.co/29EjDJT

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

What In-House Counsel should know about CyberSecurity Information Sharing…

Posted by Johnny Lee on July 8, 2016

What In-House Counsel should know about CyberSecurity Information Sharing…

HT: Christina Ayiotis

Corporate Counsel

http://ow.ly/sxHL3022WQb

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Federal court rules P.F. Chang’s breach isn’t covered by insurance…

Posted by Johnny Lee on June 9, 2016

Federal court rules P.F. Chang’s isn’t covered under a cyber-insurance policy for MasterCard assessments levied…

http://ow.ly/gjeJ3015lJD

Posted in eDiscovery | Leave a Comment »

.Symantec 2016 Report reveals phishing c

Posted by Johnny Lee on May 6, 2016

.Symantec 2016 Report reveals phishing campaigns target small businesses 43% of time…

http://ow.ly/4niE8J http://ow.ly/i/iYQks

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

Proud to support Georgia Southern University…

Posted by Johnny Lee on April 6, 2016

Proud to support Georgia Southern University…

Join me at Georgia Southern’s annual #Fraud Conference in May…ping me for a discount code.

http://ow.ly/10n2Eu

Posted in eDiscovery | Leave a Comment »

CyberSecurity & Internal Controls Frameworks…

Posted by Johnny Lee on December 8, 2015

CyberSecurity & Internal Controls Frameworks…

Happy to have contributed to @ComplianceWeek piece on #CyberSecurity & Internal Controls Frameworks.

http://ow.ly/T2UCp

HT: @tammywh

Posted in CyberSecurity, Data Breach, eDiscovery | Leave a Comment »

 
%d bloggers like this: