Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
[Editor’s Note: Cybersecurity Law & Strategy received two separate and unique pitches on the same idea — that CISOs reporting to CIOs creates inherent conflict and can actually harm the security of the organization. This article, by Board of Editors member Kenya Parrish-Dixon, echoes the sentiments presented in Jake Frazier’s article in the April issue, yet provides a different perspective on the topic, doing a deeper dive into why the roles should be separate.]
By Paul A. Ferrillo
This article is not about “who did what wrong” or “what nation-state commenced this attack.” It's really more about is, “if I am a Director, what should I be thinking about the SolarWinds attack?”
By Andrew Banquer
The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.
By Ross Benson and Robert N. Driscoll
It’s not a matter of whether you have an interest in crypto, think it’s all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.
By Christine K. Au-Yeung
NFTs have been all the rage lately. So what exactly are they?