Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF

This morning I have the privilege of speaking at the Collin County Bench Bar Conference and talking with a tremendous group of Collin County Judges and Lawyers about the risks that lawyers, their clients, and their law practices face from data insecurity issues. Here is the Prezi presentation that I will be using – take …

Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???

I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association’s Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies’ data and intellectual property, especially trade secrets. Here …

Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story …

The Legal Side of Data Breach and Third Party Risk (presentation slides)

I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and Third Party Risk. My co-presenter was Christopher Mitchell of Crowe Horwath. The following are the presentation slides used for my part of the presentation. Key Takeaway: Your company is still responsible for a data breach …

What did Sun Tzu teach about cybersecurity?

Sun Tzu taught that, when it comes to cybersecurity, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a perfectly timed cyber attack on Black Friday ’13 that resulted in credit card data from roughly 110 million customers being taken? That …

3 Important Questions Your Company Must Answer After A Data Breach

Riddle: What has sensitive data, is the target of cyber criminals, and will (almost certainly) have a data breach? Answer: YOUR COMPANY! When your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach …

Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach

Today I attended a meeting where a Special Agent of the United States Secret Service’s North Texas Electronic Crimes Task Force discussed the role of law enforcement in responding to hacking / data breach incidents and provided an overview of the steps the Secret Service often takes in investigating such incidents. The Special Agent passed …

The SEC Will Begin Looking at Companies’ IT Security and Data Breach Response Policies

THE POINT: Recent statements from the SEC indicate that the new standard of care for companies may require policies in place for (1) prevention, detection, and response to cyber attacks and data breaches, (2) IT training focused on security, and (3) vendor access to company systems and vendor due diligence. Do you still think your …

Data Security Involves Human Behavior and, Therefore, Is More an Art, Than a Science

I have recently written of how data breach responses and response plans cannot be one-size-fits-all and must be tailored to the unique needs of the company involved, as well as its culture. That is, they must be tailored to fit a company of humans dealing with humans. This morning I read an article that discusses …

Breach Notifications Should Focus On Preserving The Customer Relationship First, Then On Legal Requirements

When responding to a data breach, the company has two primary objectives that must be balanced: (1) complying with the legal notification and remediation requirements; and (2) preserving its relationship with its customers. In my opinion, the second is always the most important because if the business fails, we too have failed. In order to …