Exploring the Cybersphere – April 2016

This week in our blog, we offer a snapshot of cybersecurity, privacy and data security news of interest to the executive suite. Periodically, we’ll recap insights from the growing cadre of voices in this space as well as lend our own views on the issues that impact executive governance of cyber risk and response. “Spring[…]

What the…Hal?

“Open the pod bay doors, please, Hal.” “I’m sorry, Dave. I’m afraid I can’t do that.” Well, at least the little psychopath was well mannered. The world was introduced to Hal (acronym for Heuristically programmed ALgorithmic Computer) in the blockbuster film 2001: A Space Odyssey. Hal was the onboard computer system that relied on artificial[…]

The Elephant in the Room

Ever wonder about the origin of the phrase “the elephant in the room?”  Did the phrase originate with Russian author Ivan Andreevich Krylov, whose “The Inquisitive Man” tells of a man who goes to a museum and notices all sorts of tiny things, but fails to notice an elephant? Or does it stem from an argument[…]

How I…Respond to a Hack Attack

Transparency and constant communication are key to a company’s response plan, says Tom Davis, vice president and crisis management expert at Susan Davis International. By Naomi Eide, BizSmarts Published in the Washington Business Journal Sep 18, 2015 With security breaches popping into the news almost weekly, Susan Davis International works to find the best way[…]

Heads in the Sand Over Cybersecurity?

The ostrich defense is a criminal defendant’s claim of being ignorant of the criminal activities of an associate, which normally the defendant would be expected to be aware of. The defendants seeking this defense claim that all wrongdoing was performed by others, without his/her knowledge or consent. This defense is so named because of the[…]