Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss how liability and blame is a serious obstacle to keeping the internet secure with our guest, professor and published author, Josephine Wolff.

What can we learn from Real-Life Examples? Retail giants Target and Home Depot are two notorious examples of large-scale cyber-attacks. In both cases, tens of millions of credit cards were…

How to Apply NIST Cybersecurity Framework to your Organization Remember, in the last post, when I referred to DE.CM-7? I’m going to use this specific code again for my…
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss ABA Formal Opinion 483, which sets out requirements for law firms who suffer breaches of client data.

What is NIST? Over the years, some executives that I’ve spoken with have thought that cyber risk management means buying and installing a bunch of software and hardware products, then…

What is ACP? To wrap things up in this series, I’m going to explain how ACP (attorney-client privilege) and AWP (attorney work product) apply to your company’s cybersecurity efforts. To…
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, reveal how people with privileged accounts are managing bigger risks to their organization than ever before. In the world of CCPA, GDPR, and SHIELD, not carefully setting permissions on those data lakes will lead to massive penalties for some organizations.

The Attorney Work-Product Doctrine Continuing from the last post on attorney-client privilege (ACP), I’d like to introduce another crucial part of ACP that will protect your company in the future….

What can ACP do for your company? As cybercriminals threaten more and more companies in recent years, the world of cybersecurity has had a new layer added to it; Law….
Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead at Focal Law Group, discuss how cyber criminals are sending ransom demands to the people in the records they steal.