Cybersecurity and Incident Response
Cyber-attacks are extraordinarily complicated and require a broad range of costly responses, including digital forensic preservation and investigation, notification of a broad range of third parties and other constituencies (customers, partners, empl…
Read More
Penetration Testing
John Reed Stark Consulting LLC partners with KoreLogic to conduct uniquely specialized penetration testing for public and private companies, including and especially SEC regulated entities. The collaboration of John Reed Stark Consulting and KoreLogi…
Read More
Ransomware Recovery
Your system just got hit with a ransomware attack and your files are now locked up. How do you respond to this cyber-extortion? John Reed Stark Consulting will investigate the severity of the attack and work to reverse-engineer the malware that has t…
Read More
Board of Directors Advisory Services
Experiencing a corporate cyber-attack is not a matter of “if” but “when” and boards of directors are quickly realizing that cybersecurity risk, formerly the province of corporate IT executives, has suddenly become fertile boardroom territory.…
Read More
Cyber Insurance
There is a saying in the cybersecurity industry that there are two types of businesses today: Those that have been breached and know it and those that have been breached and just don’t know it. To manage this burgeoning yet still nascent threat, ju…
Read More
SEC and FINRA Compliance
Technology and securities regulation are now inexorably linked, and issues of data retention, data management, cybersecurity, etc. dominate SEC and FINRA compliance agendas. For instance, responding to FINRA and SEC demands for information, whether v…
Read More
Password Review and Recovery
Confidential intellectual property, networks, and systems depend on passwords chosen by end users. As managers, you must rely on your users to not place company assets at risk. At the same time, business functions are increasingly relying on password…
Read More
Law Firm Cybersecurity Assessments
Security is hard enough without being in the cross hairs of nation state hackers. However, that comes with the territory for law firms, who handle the strategic information cyber-attackers crave. Even using next generation security measures, adversar…
Read More
Expert Witness
Whether it be for cybersecurity advice; data breach response advice; or SEC/FINRA fraud or compliance, John Reed Stark can become a qualified expert. John Reed Stark’s lengthy and distinguished career provides a unique kind of expert, whose reputat…
Read More
CybersecurityDocket.com
As the Contributing Editor to CybersecurityDocket.com, John Reed Stark produces “Stark on Incident Response,” where he chronicles and analyzes the latest news and events relating to data breach and incident response, and reports on conver…
Read More
Course: Legal Issues of Cybersecurity and Data Breach Response
Syllabus Day-by-Day Course Schedule Materials Simulation Scenario Current Events (Fall 2021) More Materials (Not Required, Just Extra Resources) Current Events From Prior Years
Read More
Digital Trust Watch
Available for our clients, colleagues and friends, Digital Trust Watch serves as a virtual resource and online information platform. Our objective is to curate a growing anthology of objective, unbiassed, contemplative and evenhanded thought leadersh…
Read More