Overview The phrase reasonable security procedures and practices appears in California law, including the new California Consumer Privacy Act (CCPA). The phrase is left undefined except that reasonable is to relate to the nature of the information, … [Read more...] about Minimum Reasonable Information Security Practices
Small Business
Steven Brower
I was the first(?) non-scientist with regular access to the Internet (then the Arpanet - 1972 - 2 digit "IP address"). Then I became an IBM mainframe computer programmer (Cobol, APL, RPG II). Then I concurrently became a lawyer (40+ years … [Read more...] about Steven Brower
Simplified PCI Compliance
This webinar covers the basics of PCI compliance, along with the framework that outlines protection and management of credit card information. It covers everything from determining if you’re in-scope, how to de-scope to save money and maintaining … [Read more...] about Simplified PCI Compliance
Mr. Scott Pierangelo
R. Scott Pierangelo MSCS, CISSP, PCIP, QSA, CISA, CISM, CRISC, CGEIT, PMP, CDPSE. Mr. Pierangelo has been conducting auditing assessments for over ten years. He has worked for Trustwave and Coalfire as a Consultant/QSA, and has conducted PCI … [Read more...] about Mr. Scott Pierangelo
Mr. Howard Miller
Presenter/Speaker: Risk management/insurance, emerging risk, cyber risk, technology risk, cyber liability insurance. Contact me for educational presentations or panel discussions. I have developed university course material and enjoy educating. RISK … [Read more...] about Mr. Howard Miller
Mr. David Lam CISSP
For more than 30 years, David has been managing information for small and medium businesses including custom software development, systems management, and information security. As a former Chief Information Officer (CIO) and Chief Information … [Read more...] about Mr. David Lam CISSP
Information Security Management Webinar: Ask the Lawyer: Updates on the Evolving Security and Privacy Legal Landscape with Jordan Fischer
Join attorney Jordan Fischer, CIPP-E, CIPP-US, CIPM who leads Beckage’s Global Privacy Team for our next Information Security Management Webinar on January 14th! Title: Ask the Lawyer: Updates on the Evolving Security and Privacy Legal … [Read more...] about Information Security Management Webinar: Ask the Lawyer: Updates on the Evolving Security and Privacy Legal Landscape with Jordan Fischer
Business E-Mail Compromise
Since 2013, when the FBI began tracking an emerging financial cyber threat called business e-mail compromise (BEC), organized crime groups have targeted large and small companies and organizations in every U.S. state and more than 100 countries … [Read more...] about Business E-Mail Compromise
Ransomware
Ransomware Basics Ransomware is malicious software (malware) that takes over a computer (Desktops, Workstations, Servers) or holds its data hostage to extort money from victims by denying access to that computer or data. Ransomware can be … [Read more...] about Ransomware
FBI IC3 2019 Internet Crime Report
The FBI is the lead federal agency for investigating malicious cyber activity by criminals,nation-state adversaries, and terrorists. To fulfill this mission, the FBI often developsresources to enhance operations and collaboration. One such resource … [Read more...] about FBI IC3 2019 Internet Crime Report