Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies

Countdown to GDPR Compliance is a complimentary webinar that I will be moderating on Thursday, December 7, 2017, at 12:00 PM Central.  This is the second webinar in a three-part series sponsored by Mackrell International and will focus on Compliance for Non-EU Companies. You don't want to miss it! Moderator: Shawn Tuma Presenter: Marta Stephanian, … Continue reading Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies

IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus

On August 1, 2017, the Senate Cybersecurity Caucus introduced the "Internet of Things (IoT) Cybersecurity Improvement Act of 2017," bi-partisan legislation focused on establishing minimum security requirements for the federal procurement of Internet connected devices (#IoT). The legislation is directed at vendors who supply IoT devices to the federal government. It requires that such products are … Continue reading IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus

Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data

I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance, … Continue reading Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data

Dyn, Krebs, and Mirai Botnet – the IoT Pandora’s Box is Open, Now What?

usinesses now risk disruption from attacks by a minion army of "smart" IoT devices through DDoS attacks like those experienced by Dyn last Friday, and Brian Krebs in late September. The Mirai IoT botnet made these attacks possible and, because its source code was recently released into the wild, it will likely be used against other companies. Now that this IoT Pandora's Box has been opened, what do we do?