Data Classification…it just makes sense – One girl’s not so technical opinion

Data Classification As a layperson in a world of information security professionals, it’s sometimes a bit daunting keeping up from a technical perspective. Throughout my career, I’ve tried to arm myself with enough technical knowledge to engage in a discussion, however knew that inevitably, I’d have to bring in the “big guns” when I started […]

New York Regulators – Take Aim at Cybersecurity Expectations: What You Need to Know

The New York Department for Financial Services’ (NYDFS) Cybersecurity Regulations (23 NYCRR 500) recently came into force and represent a new code of conduct, impacting all firms operating in the financial services industry within the State of New York, and is designed to protect the data of customers in the financial services sector. The new […]

Texas Supreme Court Raises the Bar for Trade Secrets Damages–Again

By Zach Wolfe in Damages, Texas Litigation, Trade Secret Litigation July 10, 2017 Horizon v. Acadia finds expert’s assumptions too speculative to support lost profits verdict Mamas, don’t let your babies grow up to be damages experts in Texas. That’s the refrain CPAs may feel like singing after the Texas Supreme Court recently raised the bar for proving lost […]

Webinar Replay: Controlled Unclassified Information (CUI): The Federal Push to Protect Information

Federal contractors have until December 31, 2017 to fully comply with NIST Special Publication 800-171 standards, or risk the loss of existing contracts and disqualification from future opportunities. If you are a contractor who works with the Department of Defense (DoD) or Federal Government and handle Controlled Unclassified Information (CUI), you are required to comply […]

Webinar Replay: Protecting Valuable Trade Secrets and Intellectual Property

  The most important assets modern-day firms possess are the trade secrets and other intellectual property that differentiate your organization from global competition. The loss of this critical, sensitive data through insider attacks, employee negligence or targeted external attacks can have a catastrophic impact on your organizations’ competitiveness and survival. In May of 2016 the Defend Trade […]

Anatomy of a trade secret misappropriation court case

Background: Company ABCD has a portfolio of IP assets, included a number of trade secrets. These trade secrets assets may be found across different functions in the organisation and include: ·        Some algorithms within the R&D function ·        Customer data managed by Sales & Marketing functions ·        Some filtration process held by Operations in the factory ·        Some negative […]

The Smart Path Forward – IACI Conference

On October 2016, IACI convened its inaugural conference in Washington bringing together Government and Industry “Change Agents” to highlight opportunities and collaborate to advance cybersecurity at a more rapid pace through information sharing, coordinated response, and adaption of best practice to operationalize sector-specific cyber resilience supported by education. IACI Delegates will continue their valuable work […]

The “Move to the Cloud” Executive Luncheon

The “move to the cloud” has long been considered a key initiative by enterprises worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how some systems and data are being protected. In May 2016, the Defend Trade Secrets Act […]