

Angle
It’s Time to Blow the Whistle on Deficient Cyber Reporting Programs
4 Mins
What exactly is cybersecurity whistleblowing? That is a question that all organizations should be asking, but the answer is not a simple one. According to the Merriam-Webster dictionary, a whistleblower is defined as an 'employee who brings...
Read MoreHow Thinking Outside Silos Helps Risk Management and Cyber Threat Response
3 Mins
The term “risk” gets tossed around constantly in the corporate world. But who is responsible for defining and managing risk? This answer is not black and white, as risk type and appetite will look different for every organization. What should be a...
Read MoreElevating Cyber Risk Analysis During M&A Due Diligence
4 Mins
Before a deal closes on a merger or acquisition, due diligence investigation will ensue to confirm goal alignment and identify any obstacles present. There are several integral components of this process such as identifying transaction purpose...
Read MoreMandated Cyber and Privacy CLE for New York Attorneys – Will Other States Follow Suit?
3 Mins
The majority of U.S. states require attorneys with active law licenses to complete continuing legal education (CLE) credits. The number of hours, reporting deadlines, and topic requirements differ between jurisdictions. It is not only important...
Read MoreCounsel and the Breach Response Lifecycle: Best Practices at Every Stage
3 Mins
The shift to automated business processes and digital data management has definitely been a key enabler for organizations across industries. This fosters more efficient transactions, saves on costs, reduces time spent on projects, and helps...
Read MoreRising Premiums and Ransomware: The Cyber Insurance Balancing Act
5 Mins
With greater potential for data compromises comes a greater need to explore cyber insurance. The dilemma that ensues is that when attack prevalence rises, it heightens risk for both organizations and insurers.
Read MoreData at Your Fingertips? Make Sure You are Prepared for Biometric Data Legislation
6 Mins
Biometric technology data is generated more frequently these days in private and professional settings as authentication methods like fingerprint scanning, facial recognition, and voice recognition are becoming standard on modern devices. Many...
Read MoreThe Ins and Outs of Early Case Assessment for a Cyber Incident Review
4 Mins
In the fast-moving industry of cyber incident response, success and efficiency come from preparation. Once a matter is promoted to review, the most common request for timing is “as soon as possible.” How is a client’s desire for expediency...
Read MoreConsiderations to Streamline Cyber Incident Response Reviews
5 Mins
Dealing with a cyber incident is an incredibly stressful time for clients and counsel. Not only is there the stress of dealing with the initial breach, but also the pressure to do a review of what data was compromised in quick order. Ensuring that...
Read MoreTips for Handling a Cyber Incident Review
5 Mins
A cyber security incident is a stressful and frightening event for an organization’s team. When it comes to putting cyber plans in place, organizations need to prepare for the worst-case scenario since it is no longer a matter of if a breach will...
Read More










