More Cybersecurity Articles

Technology

The Cyberthreat Within: As companies wake up to insider threats, C-suite executives are looking beyond IT for help

Two of the most insidious myths about cybersecurity are that most threats originate outside an organization – Russian hackers, for example – and that it is an IT problem. Amie Taal, a cybersecurity expert with Deutsche Bank, Jenny Le, who runs operations for e-discovery provider FRONTEO...

Read More

Cybersecurity

After the Data Deluge: “Keep it all, keep it forever” won’t do any longer. As paradigms shift, information governance, including defensible data remediation, takes center stage

Most experts agree that a sound information governance and data remediation program is vital to driving an organization’s business and reducing its risk profile. But how and why and when and with whom are all questions under active consideration. In this interview, Therese Craparo of Reed...

Read More

Cybersecurity

Publisher's Note July 2016

Welcome to our annual July-August double issue where we focus on two interrelated areas, risk and cybersecurity. We are also pleased to present our usual broad array of topics of keen interest to GCs and their teams. You’ll find insightful takes on ADA compliance for company websites (p.10),...

Read More

Recent Cybersecurity Video