Video: 2016 Predictions – Mauricio Paez

Posted on Mar 31 2016 by

Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in global cyberwarfare. Watch to learn his insights.


Video: 2016 Predictions – Jon-Michael Brook

Posted on Mar 30 2016 by

With 2016 an election year that's already seen some evidence of campaign breaches, how much more will we see the frequency and intensity potential increase before the polls close? Jon-Michael Brooke of Guide Holdings LLC joins me for a preview of the most significant potentials for the campaign whose data is snatched.


Video: 2016 Predictions – Lynn Sessions

Posted on Mar 24 2016 by

How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true security violations by external forces has triggered an increase in notifications on a serious scale in the healthcare space.


Why Are Employees the Weakest Link in Breach Prevention? Hear Answers at IAPP Global Privacy Summit

Posted on Mar 22 2016 by

Employees are a company’s biggest asset, but when it comes to cyber security, they are often the weakest link. Unfortunately, a large number of security incidents are caused by employee negligence or the compromise of their computers or phones, leaving even companies with strong technical security programs at risk.


Video: 2016 Predictions – Bill Hardin

Posted on Mar 18 2016 by

With the first quarter of 2016 wrapping up, it’s a good time to take a look at the cyber security trends that emerged at the end of 2015 and the beginning of 2016. What are the cyber risks companies will need to be most vigilant against for the rest of the year?


What the EMV Liability Shift Means for Your Business

Posted on Mar 08 2016 by

As of last October, the EMV liability shift is a point of reality for consumers and businesses alike. Now, if your business is not yet chip-ready and card fraud occurs in a point-of-sale transaction in which a consumer uses a chip-enabled card, you — not the card-holder or issuer — could be liable for costs […]


Infographic: Timeline of a Data Breach Response

Posted on Feb 23 2016 by

      Preparing a breach response plan is sometimes a painful topic, planning the response that should happen after your business becomes the unfortunate victim of a cyber attack. How exactly should things work? Explore the timing of the planning and execution of a response – before and after the breach – as a […]


Involving Head Honchos in Data Breach Response

Posted on Feb 09 2016 by

Shouldn’t it be easy to convince your senior executives of the importance of cyber security? High-profile data breaches make the news, and your top decision-makers surely read the same headlines you do. Those reports — and numerous studies — make it clear that cyber security incidents continue to grow in volume, frequency and impact. Yet […]


Video: 2016 Predictions – Katherine Keefe

Posted on Jan 27 2016 by

  There have been no shortage of changes in the medical world in the last few years, many triggered by the arrival of the Affordable Care Act. As providers look to unify to provide services, what effects might their consolidation efforts have on information security? Katherine Keefe of Beazley Breach Response joins me to share […]


Updated Data Breach Response Guide Can Help Your Breach Survival

Posted on Jan 13 2016 by

More companies than ever are taking a proactive approach to data breaches; our second annual data breach preparedness study, conducted by Ponemon, found that 72 percent of polled companies had a data breach response plan in place, a 5 percent increase from the year before. Experian Data Breach Resolution believes that figure needs to reach […]