I recently had the pleasure of speaking to a great group of Collin County lawyers in the Collin County Bar Association's Law Practice Management Section about the practical and ethical considerations of using social media in a law practice as well as my own tips that I have learned by using social media in my practice. Here … Continue reading Using Social Media in Your Law Practice – Prezi Presentation
I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association's Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies' data and intellectual property, especially trade secrets. Here … Continue reading Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???
Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members' faces when I first mention the issue. The story … Continue reading Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu
I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and Third Party Risk. My co-presenter was Christopher Mitchell of Crowe Horwath. The following are the presentation slides used for my part of the presentation. Key Takeaway: Your company is still responsible for a data breach … Continue reading The Legal Side of Data Breach and Third Party Risk (presentation slides)
Sun Tzu taught that, when it comes to data security, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a perfectly timed cyber attack on Black Friday '13 that resulted in credit card data from roughly 110 million customers being taken? … Continue reading What did Sun Tzu teach about data security?