Join Us On LinkedIn

Cybersecurity Docket welcomes your nominations for our ‘IR 30′ for 2019 — the 30 best and brightest Incident Response legal and compliance professionals in the industry.
Please join Luke Tenery, Ted Theisen, Christopher Todd Doss and Daron M. Hartvigsen for this webcast.
Cybersecurity Docket welcomes your nominations for our ‘IR 30′ for 2018 — the 30 best and brightest Incident Response legal and compliance professionals in the industry.
Cybersecurity talent gaps exist across the country. Closing these gaps requires detailed knowledge of the cybersecurity workforce in your region. This interactive heat map provides a granular snapshot of demand and supply data for cybersecurity jobs at the state and metro area levels, and can be used to grasp the challenges and opportunities facing your […]
All of which is to say: Somewhat ironically, in order to bridge the gap between what gets taught in the classroom and what kind of skills employers are looking for, the rapidly expanding field of cybersecurity needs to break down barriers, not put them up. As Sanders put it, “There needs to be communication between […]
DHS recently released the refreshed National Cyber Incident Response Plan (NCIRP). Since the last version of the NCIRP was released in 2010, the nation has increasingly faced more complex cyber incidents. Every day, incidents across the United States necessitate that jurisdictions and organizations work together to share resources, integrate tactics and take actions to meet […]
Among the most valuable lessons the session hopes to instill in its attendees is that “legal is going to have to take the lead role in going through a response,” Rizzolo said. “It’s really the legal department that’s going to have to marshal the troops.” Though coordinating and leading an incident response plan may seem […]
It’s back! Register now for Incident Response Forum 2017!
In my recent article entitled, “Why Donald Trump is Spot-on About the Russians and the Election,” I was inspired by the surprising level of misinformation being spread about the Russians and the Election — I wanted to take an objective, detailed, comprehensive and scientific analysis of the facts, so intelligent readers could rise above all of the noise.
In my recent white paper series, the first part of which is entitled, “Top Cybersecurity Concerns for Every Board of Directors: Cybersecurity Governance,” I outline a strategic framework for boards of directors to effectively analyze and supervise corporate cybersecurity risks. Each of these white papers is being published exclusively on Nasdaq’s Governance Clearinghouse.
In my recent article, entitled, “Hidden Lessons from Anthony Weiner’s Laptop (Computer),” I present some critical and practical legal lessons related to the delicate, complex and tricky issues relating to the government’s seeking, requesting, demanding, subpoenaing and seizing of digital evidence in a criminal or civil investigation.
In my recent articles, entitled, “Cybersecurity Personnel: Recruiting the New Fighter Pilots” and “Timeless HR Lessons From Five Great Watch Companies”, I present some critical and practical HR lessons for handling the current cybersecurity labor shortage as well as some general HR lessons, which serve as a powerful refresher for all corporate executives.
In my recent article, entitled, Cyber Insurance Bespoke: Tips For Finding The Right Policy and excerpted from a series of articles I wrote at the request of the NASDAQ Governance Clearinghouse, I review some critical caveats and guidelines to consider when purchasing cyber insurance.
C-Suite executives can learn some critical lessons about cybersecurity from Secretary Hillary Clinton’s email server fiasco — and not just about the perils of operating a private company server in a Chappaqua, New York suburban basement. In today’s post, I undertake an in-depth analysis of the key takeaways from the Hillary Clinton email server morass and glean some vital lessons for the C-Suite.
My story of lateraling into my legal career in cybersecurity is probably not unique to most lawyers working in the field right now since most of us are too old to be considered digital, much less cybersecurity “natives.” But, however the cybersecurity practice grows, whether through mid-career shifts or law school recruitment, there are too […]