I recently had the pleasure of representing the Association of Corporate Counsel by moderating a panel at the National Bar Association conference in Scottsdale, AZ. The panel, “Understanding Cybersecurity Risks: Issues & Trends,” included four exceptional speakers: Marcus A. Christian, Partner, Mayer Brown LLP; Lillian S. Hardy, Counsel, Hogan Lovells; Antonio D. Robinson, Vice President, … Continue reading Are You Prepared in the Case of a Data Breach?
The latter part of 2015 saw social media and legal alerts blowing up about the EU/US Safe Harbor and the EU General Data Protection Regulation (the “GDPR”). Unless one is a privacy professional working with European data, one probably is relatively unfamiliar with the EU/US Safe Harbor and just what is going on. Here is … Continue reading Safe Harbor is Dead! A Primer on EU Data Transfer And Why We Should Care
The bring-your-own-device (BYOD) trend continues to be a growing trend for businesses. In fact, according to Gartner, 38 percent of companies expect to stop providing devices to workers by 2016, and by 2017 half of all businesses will require employees to provide their own mobile devices. Researchers have estimated that there will be more than … Continue reading Mobile Personas Help Solve BYOD Issues
According to Forrester Research, more than half of North American and European organizations are developing bring-your-own-device (BYOD) policies in the workplace. However, letting employees use their personal mobile devices for work-related purposes can cause problems relating to company security policies, laws and employee privacy perceptions. Many businesses, for example, have deployed enterprise mobility management (EMM) … Continue reading Balancing Security and Privacy in BYOD
In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s … Continue reading Five Best Practices for Securing Mobile Devices and Everything They Touch
What increased 66 percent in the span of just a few months? The amount of court cases where social media content was key evidence. That trend means it’s a matter of when, not if, your organization winds up embroiled in a case centering around social content. Skeptical? Consider how the selection of social media services … Continue reading Social Media + Mobile = New Privacy and Security Risks
If you are among the 74 percent of organizations using or adopting a bring-your-own-device (BYOD) policy then you know that the key to a successful enterprise mobile strategy is understanding not only technology, but also human nature.1 When employees are allowed to use their personal smartphone or tablet for work there’s a marked uptick to … Continue reading You’ve Adopted a BYOD Mobile Strategy. Now What?
More often than not, we are reading headlines about high-profile email hacks. The recent Pentagon breach, for example, shows the number of emails most workers receive daily, increases the chances that phishing and other attack methods will succeed. The good news? There is no shortage of proven technologies and practices for securing emails and, in … Continue reading Why It’s Time to Rethink Email Security
When it comes to managing the ever-changing technology landscape—enterprise mobility in particular is a beast. Business leaders are faced with a complicated mix of new devices, accelerated product lifecycles and system integration nightmares, compounded by what appear to be weekly cybersecurity hacks and compliance violations. Sadly this just scratches the surface of what CSOs, CISOs … Continue reading Adopting a Mobile-First BYOD Strategy