Search

How to Safely Engage External Advisors During Cyber Incidents

How-to-Safely-Engage-External-Advisors-During-Cyber-Incidents

Today’s digital world is constantly changing, with cyber threats becoming more complex and evolving rapidly. This presents significant challenges for businesses in all sectors, especially those operating within critical infrastructure. These threats don’t just affect the technical aspects; they also impact how an organization operates, its legal responsibilities, and its overall strategy.

Classified-Tier Communications for Executive, Board, and Sensitive Use Cases

Classified-Tier-Security-for-Protecting-High-Stakes-Communications

Sensitive communications within executive teams, boards, and other high-level functions are prime targets for adversaries, especially in today’s landscape where AI is increasingly being leveraged to assess and exploit stolen data. These communications—often involving M&A, internal investigations, HR matters, and legal discussions—can have devastating consequences if leaked.

Key Takeaways: Cybersecurity Interdisciplinary Tips on the New Regulatory Landscape for In-House Counsel

Cybersecurity-Tips-on-the-New-Regulatory-Landscape-for-In-House-Counsel

The Association of Corporate Counsel (ACC) Chicago recently hosted a dynamic panel discussion, “Cybersecurity: Interdisciplinary Tips on the New Regulatory Landscape for In-House Counsel,” in partnership with Benesch Law.

The panel, which included ArmorText CEO Navroop Mitter, offered invaluable insights into the evolving cybersecurity regulatory landscape and how in-house counsel can better prepare for potential breaches.

The Hidden Risks of Using Enterprise Collaboration Tools in the Wake of a Cyber Breach

Hidden-Risks-of-Enterprise-Collaboration-Tools-in-the-Wake-of-a-Cyber-Breach

Following an attack, the immediate focus is often on damage control and restoring normalcy. However, there’s a lurking danger in continuing to use your everyday communication tools. These platforms, vital for daily operations, can become liabilities after a breach, providing hackers with a backdoor for surveillance, data theft, and further attacks.

Secure Out-of-Band Collaboration: Why It’s the Cornerstone for Incident Response in the Energy Sector

Why-Secure-Out-of-Band-Collaboration-is-Key-for-Incident-Response-in-Energy-Sector

The hard divide between OT and IT is a long-standing tradition in the Energy industry but the lines between OT and IT in Energy are blurring more and more as both contend with a cyber security reality where adversaries find novel ways to impact both sides, and new cyber regulations further reduce tolerance for delays in responding during an incident. As this occurs, OT and IT teams need to re-think about how they communicate during a crisis.

Search