Our Blog


RESULTS FOR: Cyber Security

The Coming of the Cyber Monitor

January 20, 2016 | Cyber Security Monitoring

Regulators, like prosecutors, are increasingly turning to independent monitors as a means of moving non-compliant entities into compliance. It appears certain that the appointment of independent monitors to enforce compliance with cybersecurity regulations will become common.  Several financial industry regulators are moving to establish cybersecurity standards with which financial institutions will have to comply just as they do with money laundering and other regulations.

This past November, the New York State Department of Financial Services issued a memorandum to numerous
Read More

Command Center Best Practices and Social Media Intelligence

November 19, 2015 | Cyber Security

Recently, I had the honor to speak on the topic of ‘Command Center Best Practices’ at the Latitude conference hosted by Geofeedia in Chicago.  Latitude is the only location-based social media intelligence conference currently being offered to corporate and public-sector audiences.

The event was well-attended by a broad spectrum of key stakeholders tasked with the integration of social media intelligence into their operating environments.

My panel covered a wide array of topics including the transition of the Command Center function … Read More

Have We Learned to Anticipate the Problems?

June 11, 2015 | Cyber Security

Knowing what to expect is a great way to avoid trouble.  We drive our cars safely because we have learned what the dangers are.  We check side view mirrors before changing lanes.  We use mirrors and turn around to back up safely.  We slow our rate of speed when conditions get slick.  At least we should do all these things and we are safer when we do.  Nevertheless, accidents still happen, especially when the other driver is being reckless.  Indeed, … Read More