Technical Corner

Generations, Security, and Cybersecurity: How Yesterday’s Concepts of Security Impact Security Today

Date: March 20, 2018 Time: Noon ET (60 Minutes) Guest Speaker: M. Lisa Shasteen, Esq., Shasteen & Percy, P.A. Host: Lisa Niemeier, Founder and Managing Member of graymatter Strategies LLC, PPI Dean of Generational Impact As with almost every other aspect of life, different generations’ concepts of security determine not only how willing we are to actively [...]

By | 2018-02-28T13:08:33+00:00 February 28th, 2018|Technical Corner|

Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 2 of 2)

In this session, we discuss best practices for cybersecurity and data privacy, as well as federal and state legal considerations that drive business requirements.  Please see the archives for Part 1, which focuses on the most urgent threats to business today, as identified by the FBI.

By | 2017-11-06T11:37:57+00:00 October 31st, 2017|Technical Corner, The Business of the Practice|

Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 1 of 2)

The news is awash with reports of identity theft.  Equifax, Sony, Office of Personnel Management (OPM), Anthem and other hacks increasingly dominate the news and even bring our national election into question.  We hear of ransomware hitting Merck Pharmaceuticals and our local hospitals.  Insiders at Wells Fargo are using our identities to churn accounts for bonuses.  Power grids and water supply systems are at risk, and the FBI reports that business email compromise (BEC) is a primary threat to all businesses within the United States. Why is this happening, and what can we do to protect ourselves? Should we even try?  What are our legal obligations to our clients and employees?  We have become completely reliant upon cutting-edge technologies.  We love their convenience but often do not grasp the behavioral and organizational changes these new capabilities require, nor the vulnerabilities they create.  Criminals rely on our inertia and procrastination.  The good news is that there are some relatively simple and inexpensive steps that everyone can take to greatly enhance security.  The first step is to change our mental models. This session will investigate the invisible rise of a cultural meme every bit as relentless and destructive as a hurricane and some relatively simple steps we can all take to better secure ourselves and others we have a duty to protect.

By | 2017-10-31T08:35:05+00:00 October 24th, 2017|Technical Corner, The Business of the Practice|