Reducing Your Legal Exposure After a Cybersecurity Incident


How can your organization reduce its legal exposure immediately following a data breach? Cybersecurity events like data breaches make headlines regularly and cost businesses millions in fines and lawsuits. Breach announcements topple executives, destroy shareholder confidence, push customers away, invite regulatory scrutiny, and inflict lasting damage to organizations. Right after a cybersecurity incident, everyone is […]

Prevent Your Cybersecurity “Castle in the Cloud” From Crumbling

The Fortress of the Knights, located in Syria, was one of the most impenetrable, secure castles in history. The surrounding land steeply slopes away, making access to the castle difficult and rendering traditional invasion methods ineffective. But, in 1271, it finally fell to a group of Muslim sultans who used stealth to take down the castle. In […]

5 Highlights from Atlanta MIT’s “2017 Trends in Cybersecurity”

Did you know the State of Georgia has more than 115 information security companies that generate over $4.7 billion in annual revenue? Moreover, five of 2016’s Cybersecurity 500 are based in Atlanta, which has been a growing hotbed for security technology and innovation. I was fortunate to attend last week’s sold-out MIT Enterprise Forum Atlanta panel discussion at […]

Does your Identity Management Program Pass the ‘Marshmallow Test’?

There is a famous series of studies about self-discipline called the ‘Marshmallow Test’ that was run by Stanford University in the 60s and 70s. During these studies, children were offered a choice between getting a single marshmallow immediately or getting a whole bag of marshmallows if they waited for a short period, during which the […]

6 Must-Read Cybersecurity Articles, January 2016

Here are the must-read Cybersecurity, Infosec, and Identity Management articles from January 1 – 13, 2016. You can sign up for our biweekly newsletter here.   Researchers Out Default Passwords Packaged With ICS/SCADA Wares Information was gathered on more than 100 products using default passwords such as “admin.admin,” “password,” “root,” and “administrator,” found in the open passwords lists and vendor documentation. […]

Getting Started with Data Loss Prevention: 4 Best Practices

Client A implemented DLP blocking early in the project and blocked several key business transactions. They had not defined a process to review and resolve false positives quickly, and once the business users became unhappy it led to the removal of the DLP solution. Organizations have had a tumultuous relationship with Data Loss Prevention solutions […]

Takeaways from the 2015 Cybersecurity Forum in Atlanta

Here are some cool takeaways from the Cybersecurity Forum with Israel and the American South hosted by Baker Donelson at Georgia Tech. The conference was broad in scope and addressed a wide range of issues in Cybersecurity across people, process, and technology. Here are some of the most impactful sound bites from the forum: Today, […]