Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources Cybersecurity and Law Firms: Part 2 Last time I established some key elements that law firms should keep in mind about…Kip BoyleAugust 17, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecuritySecurity Risk AsessmentView All Resources Steps to Mastering Cyber Security: Part 2 Today, we’re continuing with my steps to master cybersecurity in part two of this series.…Kip BoyleJuly 20, 2020
Cybersecurity Executive ToolkitCybersecurity PolicySecurity Risk AsessmentView All Resources Cyber Risk Management and Attorney-Client Privilege Series Part 2 The Attorney Work-Product Doctrine Continuing from the last post on attorney-client privilege (ACP), I'd like…Kip BoyleApril 28, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 5 This blog post originally published in 2018. Fire, Flood, and Cybersecurity In some respects, cybersecurity…Kip BoyleMarch 17, 2020
Cybersecurity ThreatsNetwork SecuritySecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 3 In recent weeks I’ve been talking about the millennial mobster and the reality that savvy…Kip BoyleMarch 3, 2020
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityQuestions & AnswersSecurity Risk AsessmentView All Resources How can cybersecurity leaders minimize human error? There are two main strategies I use when I’m in the role of CISO: Make…Kip BoyleNovember 19, 2019
Cybersecurity Executive ToolkitSecurity Risk AsessmentView All Resources How do companies mitigate data breaches? By mitigate, I assume you mean a company experienced a data breach and now wants…Kip BoyleAugust 20, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsSecurity Risk AsessmentView All Resources Federal Trade Commission Versus ASUS In my last post, we discussed how the FTC used its powers in commerce to…Kip BoyleJuly 9, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsSecurity Risk AsessmentView All Resources The Federal Trade Commission Versus Wyndham Worldwide In this series of blog posts, I'll be looking at the Federal Trade Commission (FTC)…Kip BoyleJuly 2, 2019
Cybersecurity Executive ToolkitNetwork SecuritySecurity Risk AsessmentView All Resources What Worries Cybersecurity Professionals the Most? A top concern is, “do I have a false sense of security?” In other words:…Kip BoyleJune 18, 2019