Close Contact Us
Tap Here To Call Us

Articles Posted in Risk Evaluation and Management

Updated:

Facing the Knowledge Gap

Addressing privacy compliance and cybersecurity is becoming more and more challenging for companies. At least 26 states are considering various kinds of data privacy laws. At the same time the rate, depth, and impact of ransomware, wiperware and data breaches has become more intense and more expensive, and there is…

Updated:

The Supply Chain Risk Conundrum: Rethinking the Network and Its Risks

Current information security and risk mitigation approaches are ineffective, and this failure is nowhere more apparent than in critical supply chains – defense, energy, health services, and other key industries. The source of much of the persistent failure to secure supply chains and the success of hackers compromising these vital arteries of…

Updated:

Security Challenges – Three Thoughts for the New Year

2021 was a challenging year in cybersecurity, and there’s no reason to believe that this will end.  As we approach 2022, all businesses large and small need to address some basic issues that impact the security of their systems. and their customers? Vendors. No company stands alone – they depend…

Updated:

Online Workshop — A Reasonable Approach to Reasonable Security

Are your cybersecurity management practices reasonable? Do you know your risk tolerance? Are you covering all the cybersecurity bases that make up reasonable cybersecurity? The California Consumer Privacy Act (CCPA) and other emerging laws require organizations to have “reasonable cybersecurity practices.” The challenge is that there is no accepted definition…

Updated:

Webinar – The Right Stuff: Validating Reasonable Information Security

Michael A. Gold, co-chair of JMBM’s Cybersecurity & Privacy Group, will host a panel of industry leading experts for the webinar, The Right Stuff: Validating Reasonable Information Security Date: Thursday, June 18, 2020 Time: 10 AM – 11:15 AM PDT; 1 PM –  1:15 PM EDT Register Now Most organizations…

Updated:

Webinar: Privacy and Information Security – Best Practices and Imperatives

Robert E. Braun, chair of JMBM’s Cybersecurity & Privacy Group, will be the keynote speaker for the webinar, Privacy and Information Security – Best Practices and Imperatives. Date: Wednesday, May 27, 2020 Time: 2:00 PM Pacific Time Register Now As companies shift to a remote working environment due to the…

Updated:

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Moving to the Cloud to Save Money The Covid-19 pandemic has created profound challenges for almost every organization. As these challenges mount, companies are dramatically cutting their soft costs, including information security. Many companies are reducing their information security and privacy compliance spending by moving to the cloud. This is…

Updated:

Podcast: Are You Practicing Social Media Hygiene?

Leonard Lee of Thomson Reuters Legal Current interviewed Bob Braun, Co-chair of JMBM’s Cybersecurity & Privacy Group for a podcast titled, “Are You Practicing Social Media Hygiene?” Listen to the podcast here. In this brief podcast (18:28 minutes), Bob Braun discusses the risks that both companies and individuals face when…

Updated:

Webinar: What is Reasonable Information Security?

Robert E. Braun and Michael A. Gold, co-chairs of JMBM’s Cybersecurity & Privacy Group, will participate as panelists on the webinar, What is Reasonable Information Security? Date:   Thursday, April 23, 2020 Time: 10:00 AM – 11:30 AM Pacific Time Register Now JMBM’s cybersecurity lawyers, along with a cybersecurity consultant, a…

Updated:

Social Media Can Be Hazardous to Your Cybersecurity Health Part 2: Solutions

Public Service Announcement: Social media use increases your cybersecurity exposure. Share appropriately. If that were all it took. In my earlier post, I described how casual use of social media (that is, failure to take into account its impact on privacy and security) can put your company’s information security profile…

Contact Us