Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story […]

, , , , , , , ,

Leave a comment

The Legal Side of Data Breach and Third Party Risk (presentation slides)

I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and Third Party Risk. My co-presenter was Christopher Mitchell of Crowe Horwath. The following are the presentation slides used for my part of the presentation. Key Takeaway: Your company is still responsible for a data breach […]

, , , , ,

1 Comment

What did Sun Tzu teach about data security?

Sun Tzu taught that, when it comes to data security, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a perfectly timed cyber attack on Black Friday ’13 that resulted in credit card data from roughly 110 million customers being taken? […]

,

2 Comments

3 Important Questions Your Company Must Answer After A Data Breach

Riddle: What has sensitive data, is the target of cyber criminals, and will (almost certainly) have a data breach? Answer: YOUR COMPANY! When your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach […]

, , , , ,

Leave a comment

3 Steps for Obtaining Trade Secrets in Discovery

When can a competitor use litigation to find out your company’s trade secret information? Let me explain it this way … What if it was your businesses’ valuable information? Pause for a moment and imagine that your business is the industry leading innovator in its field because, through your effort and resources, you have developed secret tricks and techniques […]

, , ,

Leave a comment