Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?

Today I had a blast doing a podcast on the CFAA, Shellshock, and cyber security research with Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst) — in fact, we had so much fun that I suspect Raf had quite a time trying to edit it! The starting point for our discussion was a recent article …

Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we!

The point of the article that is the source of the quote below is exactly right: there is no consistency, cohesiveness, or harmony with the cyber crime and data privacy laws. I believe there are several reasons but these are the two that are most prominent: The cyber crime and data privacy laws are a patchwork collection …

Data Breach Judgment: Will Home Depot Be the One to “Get It”?

Will Home Depot be the one that’s “gonna get it”? Based upon the information we are learning, it could be. Way back in 2011 I wrote Data Breach — Who’s Gonna Get it? and it scared people. For good reason. In that piece I wrote of how one day, in the future, a company would come along that …

3 Steps the C-Suite Can Take to Strengthen Cyber Security

The C-Suite is ultimately responsible for failures of a company’s cyber security. A recent example of this is how Target’s CEO, CTO, and several Board Members were pushed out in the wake of its data breach. SEE BELOW FOR EVENT REGISTRATION! This puts leaders in a difficult position. It is almost a statistical certainty that …

3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach

In an earlier blog post I wrote about how [w]hen your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach to protect the data and keep it from happening? What steps is …

Two Step Data Breach Risk Test for Texas Businesses

Does your business have this digital information about other people? 1. last name + first name or first initial + social security number, driver’s license number, or other government issued identification, or account or card numbers + access codes, or 2. information that identifies an individual + concerns a health condition or healthcare  If you answered …

Why do cyber criminals want your healthcare data?

During a recent presentation a member of the audience asked me why cyber criminals would want to steal a person’s healthcare data. It is easy to understand why they would want to steal payment card data — but healthcare data — not so obvious. Here is a great answer: A crook would love [healthcare data] because, “in the world …

The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation

Data security is such a threat to businesses that it must be a key tenet of leadership for the C-Suite and the Boardroom. Over the last several years I have written and spoken extensively about the risks that businesses face from the threat of data breaches. (posts) One of the points I try to make is that …

Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???

I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association’s Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies’ data and intellectual property, especially trade secrets. Here …

Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu

Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story …