Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
[Editor’s Note: Cybersecurity Law & Strategy received two separate and unique pitches on the same idea — that CISOs reporting to CIOs creates inherent conflict and can actually harm the security of the organization. This article, by Board of Editors member Kenya Parrish-Dixon, echoes the sentiments presented in Jake Frazier’s article in the April issue, yet provides a different perspective on the topic, doing a deeper dive into why the roles should be separate.]
*May exclude premium content
By Mark Sangster
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. It reminds lawyers that while the ABA Model Rules permit virtual practice, they provide minimum requirements and recommendations for virtual practice, particularly in the areas of competence, confidentiality and supervision.
By Emil Sayegh
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
By Abeer Abu Judeh
There are numerous “gameplays” to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.
By Nicholas Gaffney
A Q&A with Bobby Malhotra of Munger, Tolles & Olson LLP, Los Angeles.