Cybersecurity and Inciden…

Cybersecurity and Incident Response

Cybersecurity and Incident Response Cyber-attacks are extraordinarily complicated and require a broad range of costly responses, including digital forensic preservation and investigation, notification of a broad range of third parties and other constituencies (customers, partners, empl… Read More
Penetration Testing

Penetration Testing

Penetration Testing John Reed Stark Consulting LLC partners with KoreLogic to conduct uniquely specialized penetration testing for public and private companies, including and especially SEC regulated entities. The collaboration of John Reed Stark Consulting and KoreLogi… Read More
Ransomware Recovery

Ransomware Recovery

Ransomware Recovery Your system just got hit with a ransomware attack and your files are now locked up. How do you respond to this cyber-extortion? John Reed Stark Consulting will investigate the severity of the attack and work to reverse-engineer the malware that has t… Read More
Board of Directors Adviso…

Board of Directors Advisory Services

Board of Directors Advisory Services Experiencing a corporate cyber-attack is not a matter of “if” but “when” and boards of directors are quickly realizing that cybersecurity risk, formerly the province of corporate IT executives, has suddenly become fertile boardroom territory.… Read More
Cyber Insurance

Cyber Insurance

Cyber Insurance There is a saying in the cybersecurity industry that there are two types of businesses today: Those that have been breached and know it and those that have been breached and just don’t know it. To manage this burgeoning yet still nascent threat, ju… Read More
SEC and FINRA Compliance

SEC and FINRA Compliance

SEC and FINRA Compliance Technology and securities regulation are now inexorably linked, and issues of data retention, data management, cybersecurity, etc. dominate SEC and FINRA compliance agendas. For instance, responding to FINRA and SEC demands for information, whether v… Read More
Password Review and Recov…

Password Review and Recovery

Password Review and Recovery Confidential intellectual property, networks, and systems depend on passwords chosen by end users. As managers, you must rely on your users to not place company assets at risk. At the same time, business functions are increasingly relying on password… Read More
Law Firm Cybersecurity As…

Law Firm Cybersecurity Assessments

Law Firm Cybersecurity Assessments Security is hard enough without being in the cross hairs of nation state hackers. However, that comes with the territory for law firms, who handle the strategic information cyber-attackers crave. Even using next generation security measures, adversar… Read More
Expert Witness

Expert Witness

Expert Witness Whether it be for cybersecurity advice; data breach response advice; or SEC/FINRA fraud or compliance, John Reed Stark can become a qualified expert. John Reed Stark’s lengthy and distinguished career provides a unique kind of expert, whose reputat… Read More
CybersecurityDocket.com

CybersecurityDocket.com

CybersecurityDocket.com As the Contributing Editor to CybersecurityDocket.com, John Reed Stark produces “Stark on Incident Response,” where he chronicles and analyzes the latest news and events relating to data breach and incident response, and reports on conver… Read More
Course: Legal Issues of C…

Course: Legal Issues of Cybersecurity and Data Breach Response

Course: Legal Issues of Cybersecurity and Data Breach Response Syllabus Day-by-Day Course Schedule Materials Simulation Scenario Current Events (Fall 2021) More Materials (Not Required, Just Extra Resources) Current Events From Prior Years Read More
Digital Trust Watch

Digital Trust Watch

Digital Trust Watch Available for our clients, colleagues and friends, Digital Trust Watch serves as a virtual resource and online information platform. Our objective is to curate a growing anthology of objective, unbiassed, contemplative and evenhanded thought leadersh… Read More