Information Security Leader, Author, Instructor and Speaker

Default utility Image

Use this CCPA compliance checklist to get up to speed TAGS: | | | The California Consumer Privacy Act is here. Businesses around the nation must now take action to protect new legal privacy …Continue reading →

Default utility Image

Lessons Learned from Six Major Data Breaches TAGS: “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →

Default utility Image

The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: | | “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →

Default utility Image

2017 in Review: The Top Cybersecurity News Stories TAGS: | | | | | | 2017 was quite a year in the world of cybersecurity! From the politicization of cyberwarfare to several major data breaches, hardly …Continue reading →

Default utility Image

2015: The InfoSec Year in Review TAGS: | | | | | | We’re wrapping up quite a year in the world of cybersecurity!  As we entered 2015, the world was just winding …Continue reading →

Default utility Image

What the Community Health Systems Breach Can Teach Your Organization TAGS: | In the spring of 2014, hackers penetrated the systems of Community Health Systems (CHS), a network of 206 hospitals located …Continue reading →