In 2017, when blockchain was the new shiny thing, a little-known micro-cap stock, Long Island Iced Tea Corp., changed its name to Long Blockchain Corp. That day, its stock price jumped 200% on the news, but it was still a beverage maker – it simply announced that it was exploring…
Articles Posted in Risk Evaluation and Management
Facing the Knowledge Gap
Addressing privacy compliance and cybersecurity is becoming more and more challenging for companies. At least 26 states are considering various kinds of data privacy laws. At the same time the rate, depth, and impact of ransomware, wiperware and data breaches has become more intense and more expensive, and there is…
The Supply Chain Risk Conundrum: Rethinking the Network and Its Risks
Current information security and risk mitigation approaches are ineffective, and this failure is nowhere more apparent than in critical supply chains – defense, energy, health services, and other key industries. The source of much of the persistent failure to secure supply chains and the success of hackers compromising these vital arteries of…
Security Challenges – Three Thoughts for the New Year
2021 was a challenging year in cybersecurity, and there’s no reason to believe that this will end. As we approach 2022, all businesses large and small need to address some basic issues that impact the security of their systems. and their customers? Vendors. No company stands alone – they depend…
Online Workshop — A Reasonable Approach to Reasonable Security
Are your cybersecurity management practices reasonable? Do you know your risk tolerance? Are you covering all the cybersecurity bases that make up reasonable cybersecurity? The California Consumer Privacy Act (CCPA) and other emerging laws require organizations to have “reasonable cybersecurity practices.” The challenge is that there is no accepted definition…
Webinar – The Right Stuff: Validating Reasonable Information Security
Michael A. Gold, co-chair of JMBM’s Cybersecurity & Privacy Group, will host a panel of industry leading experts for the webinar, The Right Stuff: Validating Reasonable Information Security Date: Thursday, June 18, 2020 Time: 10 AM – 11:15 AM PDT; 1 PM – 1:15 PM EDT Register Now Most organizations…
Webinar: Privacy and Information Security – Best Practices and Imperatives
Robert E. Braun, chair of JMBM’s Cybersecurity & Privacy Group, will be the keynote speaker for the webinar, Privacy and Information Security – Best Practices and Imperatives. Date: Wednesday, May 27, 2020 Time: 2:00 PM Pacific Time Register Now As companies shift to a remote working environment due to the…
Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations
Moving to the Cloud to Save Money The Covid-19 pandemic has created profound challenges for almost every organization. As these challenges mount, companies are dramatically cutting their soft costs, including information security. Many companies are reducing their information security and privacy compliance spending by moving to the cloud. This is…
Podcast: Are You Practicing Social Media Hygiene?
Leonard Lee of Thomson Reuters Legal Current interviewed Bob Braun, Co-chair of JMBM’s Cybersecurity & Privacy Group for a podcast titled, “Are You Practicing Social Media Hygiene?” Listen to the podcast here. In this brief podcast (18:28 minutes), Bob Braun discusses the risks that both companies and individuals face when…
Webinar: What is Reasonable Information Security?
Robert E. Braun and Michael A. Gold, co-chairs of JMBM’s Cybersecurity & Privacy Group, will participate as panelists on the webinar, What is Reasonable Information Security? Date: Thursday, April 23, 2020 Time: 10:00 AM – 11:30 AM Pacific Time Register Now JMBM’s cybersecurity lawyers, along with a cybersecurity consultant, a…