Techno Security & Digital Forensics Conference
HALOCK’s Tod Ferran will be presenting, The Questions a Judge Will Ask You After a Data Breach on June 3, 2019 at the Techno Security and Digital Forensics Conference in Myrtle Beach, SC.
HALOCK’s Tod Ferran will be presenting, The Questions a Judge Will Ask You After a Data Breach on June 3, 2019 at the Techno Security and Digital Forensics Conference in Myrtle Beach, SC.
At the CAMP IT Conference, HALOCK’s Todd Becker, Principal Consultant, and Steve Lawn, Senior Consultant, presented “KNOW WHERE YOUR NEXT ATTACK IS COMING FROM: Attack prediction and resource prioritization using community-sourced data.”
In the past decade we have seen companies defined by how their leadership responded to a cyber security incident. The most prominent incident is a data breach, which is becoming a too common occurrence, involving billions of people.
The California Consumer Privacy Act (CCPA) and more states are shaping data privacy management for reasonable security.
The American Health Lawyers Association (AHLA) Webinar on Reasonable Security: Thought Leader Perspectives Webinar – Adopting Duty of Care Risk Analysis to Drive Governance, Risk and Compliance (GRC) Learn best practices in establishing reasonable security safeguards.
How Hackers Are Attacking You by Emails and Texts. Hosted by the Institute of Real Estate Management (IREM) WHEN: 5/7/2019 1:00 PM – 2:00 PM CT
After your organization has a data breach, what would you say to a judge that asked if your safeguards were ‘reasonable?’
What is Reasonable Security? If you are breached and your case goes to litigation, you will likely be asked to demonstrate “due care” and that your controls were “reasonable.” Many are surprised to learn that a breach by itself does not constitute negligence in most cases. But judges will ask a set of questions that […]
Cybersecurity in this day and age is a collective effort. Its also a moving target as attack strategies, exploits and malware strains are constantly changing. To effectively protect users, data and capital investments from the bad guys, we continually enhance security strategies and tools with developing industry trends. For just as attack vectors evolve, […]