Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF

This morning I have the privilege of speaking at the Collin County Bench Bar Conference and talking with a tremendous group of Collin County Judges and Lawyers about the risks that lawyers, their clients, and their law practices face from data insecurity issues. Here is the Prezi presentation that I will be using – take …

Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???

I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association’s Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies’ data and intellectual property, especially trade secrets. Here …

Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story …

What did Sun Tzu teach about cybersecurity?

Sun Tzu taught that, when it comes to cybersecurity, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a perfectly timed cyber attack on Black Friday ’13 that resulted in credit card data from roughly 110 million customers being taken? That …

3 Steps for Obtaining Trade Secrets in Discovery

When can a competitor use litigation to find out your company’s trade secret information? Let me explain it this way … What if it was your businesses’ valuable information? Pause for a moment and imagine that your business is the industry leading innovator in its field because, through your effort and resources, you have developed secret tricks and techniques …

Why is PNC Bank Accusing Morgan Stanley of Corporate Espionage and Trade Secret Theft?

I often write about corporate espionage and trade secrets but I bet some of you may still be trying to imagine real-world scenarios that demonstrate exactly what those terms mean and how they apply. Let me tell you a story and see if it helps it make more sense. Let’s Talk About Your Business Let’s say …

A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?

Hackers can take over cars by hacking into their on board computer systems. Does it not stand to reason that they could do the same thing to an airplane? Maybe, maybe not, but a recent ruling by the FAA shows this was a concern for Boeing Model 777-200. May 18, 2015 Update: This post was …

Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach

Today I attended a meeting where a Special Agent of the United States Secret Service’s North Texas Electronic Crimes Task Force discussed the role of law enforcement in responding to hacking / data breach incidents and provided an overview of the steps the Secret Service often takes in investigating such incidents. The Special Agent passed …

So, your business has never had a data breach? Have you ever had an employee leave?

TAKEAWAY: Businesses must protect their data from being taken by anyone who is not authorized to have it — insiders and outsiders alike. If their data is taken in a way that is unauthorized, it is a data breach. When a former employee leaves with a thumb drive, Gmail inbox, or Dropbox of your businesses’ …

You should know this > “What do connected cars and toilets have in common?”

What do connected cars and toilets have in common? That is the title to a recent Blog Post about an upcoming presentation at VMWorld 2013, Barcelona and, when I read it, I just had to quiz my readers to see who remembered … Come on now, you do know the answer to this question, right? I …