Remove 2003 Remove Education Remove Government Remove Risk
article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

In a 2003 interview Mitnick claimed he never used stolen information or destroyed data during his hacks. Mitnik claimed that the government was less worried about the accuracy of the charges and more worried about making an example of Mitnik to discourage other hackers. government to track down offenders or impose punishments.

article thumbnail

Transition to Electronic Government: Signs of the Time

Preservica

In 2002, I accepted the position of Statewide Records and Forms Coordinator for the Wisconsin Department of Electronic Government (DEG). DEG didn’t survive the 2003 change in administration and its core functions were re-absorbed back into the Department of Administration technology divisions. Playing Catch Up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

See the Top Governance, Risk and Compliance (GRC) Tools. Other industry standards too can have the force of “pseudo-law” – notably, the NIST Cybersecurity Framework, which federal regulators often apply to financial-services firms and government contractors. PIPL Raises the Bar – And the Stakes.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

“Certifications range from penetration testers , government/industry regulatory compliance , ethical hacking , to industry knowledge,” he said. The CEH certification from the EC-Council was introduced in 2003 and is now in version 11. A variety of training options are available, both online and in person.

article thumbnail

Attacks Targeting Oil and Gas Sector Renew Questions About Cybersecurity

Hunton Privacy

Nevertheless, growing risks are leading to calls for mandatory oil and gas pipeline cybersecurity regulations. However, there are important differences between the electric grid and pipeline system, most notably in the risk of cascading impacts, that may distinguish the appropriateness of regulations that set a baseline for cybersecurity.

article thumbnail

The Sainsbury Archive chooses Preservica to create new cloud-based digital archive

Preservica

The Sainsbury Archive contains a vast array of digital materials including advertising, brand assets, marketing campaigns, every issue of the company’s in-house magazine, packaging and product designs, as well as corporate governance records such as meeting minutes, board reports and staff records.

article thumbnail

DOS and DON’TS of a 30(b)(6) Witness Deposition, Part Five

eDiscovery Daily

But other privileges may be at risk as well, including: Common Interest Privilege. The risk is that work product and other privileges overlapping as case facts become mixed with trial counsel’s mental processes and legal strategies. As noted previously, many cases discuss protection of the work product privilege. Rosenfeld, op cit.