Materials: Legal Issues of Cybersecurity and Data Breach Response

Legal Issues of Cybersecurity and Data Breach Response

Legal Issues of Cybersecu…


Yahoo’s Warning to GCs: Your Job Description Just Expanded (Big-Time), by David Fontaine and John Reed Stark (March 2017)

An Oft Overlooked PCI Incident Response Approach, by John Reed Stark (March 2015)

Think the SEC EDGAR Data Breach Involved Insider Trading? Think Again, By John Reed Stark (D&O Diary, Law 360) (October 2017)

Cybersecurity: The SEC’s Wake-up Call to Corporate Directors, by John Reed Stark and David Fontaine (March 2018)

Cyber Awareness to Cyber Expertise: The Evolution of Board Cyber Risk Management, by Phyllis Sumner and Nick Oldham (January, 2016)

Here’s what went wrong for Equifax in those first 48 hours, by John Carlin and David Newman (September, 2017)

Ensuring Best Practices in the Investigation of an Incident, by David Fagan, Ashden Fein and David Bender (March, 2016)

The Equifax and SEC Data Breaches: Takeaways, Reminders & Caveats, by John Reed Stark (September 2017)

Cybersecurity Due Diligence: A New Imperative, by John Reed Stark (June 2017)

Who gets Coverage? by Scott Godes (BTLaw Cybersecurity Blog, 2017)

About John Reed Stark

John Reed Stark's Profile Image John Reed Stark President of John Reed Consulting LLC. Served for 15 years as an SEC enforcement attorney leading cyber-related projects, investigations and enforcement actions; For 11 years as Founder/Chief of SEC Office of Internet Enforcement; For 15 years as Adjunct Professor at Georgetown University Law School teaching cyber law; For 10 years as a Guest Instructor at the FBI Academy; For 5+ years as Managing Director (three as head of the Washington, D.C. office) of Stroz, Friedberg, a global digital risk management firm, leading cybersecurity, incident response and digital compliance engagements for corporations. Appointed since 2017 as Senior Lecturing Fellow at Duke University Law School teaching law of cybersecurity and data breach response. Author of The Cybersecurity Due Diligence Handbook.