In this episode of Unauthorized Access, Kamran and Sadia welcome Lynn Peachey, director of business development at Arete. The three talk about Lynn’s life, being a woman in cyber, and perfecting the work-life balance. Welcome to the human element of cybersecurity.
Kamran Salour
Introducing Our Incident Response Interactive Map
Companies dealing with a data incident confront an uneven landscape and requirements that can differ from state to state. It is easy to feel lost. Find your way with Troutman Pepper’s new Incident Response Interactive Map, created by our cybersecurity attorneys.
With a simple and intuitive user experience, our U.S. map provides state-by-state definitions, notification…
“Board-er” Patrol in Privacy and Cyberattacks
In this episode of Unauthorized Access, Kamran and Sadia are joined by Redpoint Cybersecurity VP of Client Engagement Violet Sullivan. The three cyber experts discuss board level buy-in and how to make sure the board is prepared for a cyberattack before it happens. Violet also shares how changing the communication around these issues of cyber privacy and risk can help.
What to Do When a Phishing Attack Happens to You
Please join Consumer Financial Services Partner Chris Willis and his colleagues Privacy + Cyber Associate Sadia Mirza and Privacy + Cyber Partner Kamran Salour as they discuss phishing. Kamran and Sadia break down what phishing is, the major security risk it poses for companies, and how to handle a phishing attack.
Drafting Consumer Breach Notices — From a Litigation Perspective
In this episode of Unauthorized Access, Kamran and Sadia welcome their firm colleague, Privacy + Cyber Partner and Team Leader Ron Raether, in a discussion on consumer breach notices — specifically from Ron’s perspective as a litigator — and how plaintiff’s counsel can interpret these notices.
Can Cyber Investigations Be Canned?
Can cyber investigations be canned? Find out what Sadia, Kamran, and this month’s guest, Shawn Tuma of Spencer Fane, have to say. The gloves come off as these three breach coaches duke it out for the final word on this topic. Just kidding, we cordially discuss our thoughts and opinions on the subject and discover Shawn’s love for Winnie-The-Pooh.
Piecing It All Together: OFAC Combines Seven Years of Regulations, Amendments, and Interpretations All in One
Your business was hit with a ransomware attack over the weekend, and the critical systems are locked up (i.e., encrypted). To unlock those valuable systems and continue operating the business, the threat actor demands financial payment. After much debate, you and your team decide the business needs to meet the threat actor’s demands…
Panel Pursuit: The Ins and Outs of Becoming a Preferred Panel Vendor
In this episode of Unauthorized Access, Kamran and Sadia welcome Assistant Vice President of Cyber Services and Incident Response Linda Comerford of AmTrust. During this discussion, Linda navigates the steps of the panel process. She also offers insight on effective and ineffective practices once a panel has been secured.
Get Me Off This Ride: Understanding the Emotional Rollercoaster After a Ransomware Attack
In this episode of Unauthorized Access, Kamran and Sadia welcome Tony Kirtley of Secureworks. Tony discusses the emotional response to a ransomware attack, particularly how the emotional response mirrors the Kübler-Ross five stages of grief. Tony also shares how the sooner organizations reach the fifth stage of “acceptance” — the sooner they can make rational and pragmatic decisions in the incident response process.
Dark Web Monitoring
Immediately following a three-day stint at the Summer 2022 Net Diligence conference in Philadelphia, Kamran and Sadia welcome Kroll’s Keith Wojcieszek to the Unauthorized Access podcast. In this episode, the trio discuss common misconceptions about dark web monitoring and instances where dark web monitoring can be quite important.
Don’t forget to tune in to win this month’s prize — Troutman Pepper’s “privacy + cyber” hacker hoodie.