This document provides an overview and discussion of cybersecurity issues related to working from home during the COVID-19 pandemic. It discusses securing home networks and devices, protecting proprietary company information, training employees on cybersecurity best practices, and common cyber threats such as phishing scams taking advantage of coronavirus fears. Resources from government agencies and organizations are also included to help secure remote work environments and defend against cyberattacks.
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
"Security, Privacy Data Protection and Perspectives to Counter Cybercrime" was presented at the CodeGate 2008 security conference in Seoul, Korea, April 2008.
http://www.codegate.org/
Presentation to (ISC)2 Omaha-Lincoln Chapter meeting on March 15th, 2017. This presentation looks at managing compliance with multiple cybersecurity laws and regulations across different industries using the NIST Risk Management Framework.
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
"Security, Privacy Data Protection and Perspectives to Counter Cybercrime" was presented at the CodeGate 2008 security conference in Seoul, Korea, April 2008.
http://www.codegate.org/
Presentation to (ISC)2 Omaha-Lincoln Chapter meeting on March 15th, 2017. This presentation looks at managing compliance with multiple cybersecurity laws and regulations across different industries using the NIST Risk Management Framework.
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
This session from the ARMA Wyoming 2016 Spring Seminar outlined the different security threats social media provides to individuals as well as organizations.
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Lecture presentation to identify sets of principles, standards, or rules that guide the moral action of an individual; illustrate morality and code of conduct; apply the ten commandments of computer ethics; determine some ethical issues in computing; analyze the relevant laws in computing; criticize and argue legal issues of Data Privacy, Cybercrime and Intellectual Property.
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
Information ethics has been defined as "the branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society".[1] The term information ethics was first coined by Robert Hauptman and used in the book Ethical challenges in librarianship. It examines the morality that comes from information as a resource, a product, or as a target.[2] It provides a critical framework for considering moral issues concerning informational privacy, moral agency (e.g. whether artificial agents may be moral), new environmental issues (especially how agents should behave in the infosphere), problems arising from the life-cycle (creation, collection, recording, distribution, processing, etc.) of information (especially ownership and copyright, digital divide, and digital rights). It is very vital to understand that librarians, archivists, information professionals among others, really understand the importance of knowing how to disseminate proper information as well as being responsible with their actions when addressing information.[3]
Information ethics has evolved to relate to a range of fields such as computer ethics,[4] medical ethics, journalism[5] and the philosophy of information.
Dilemmas regarding the life of information are becoming increasingly important in a society that is defined as "the information society". The explosion of so much technology has brought information ethics to a forefront in ethical considerations. Information transmission and literacy are essential concerns in establishing an ethical foundation that promotes fair, equitable, and responsible practices. Information ethics broadly examines issues related to ownership, access, privacy, security, and community. It is also concerned with relational issues such as "the relationship between information and the good of society, the relationship between information providers and the consumers of information".[6]
Information technology affects common issues such as copyright protection, intellectual freedom, accountability, privacy, and security. Many of these issues are difficult or impossible to resolve due to fundamental tensions between Western moral philosophies (based on rules, democracy, individual rights, and personal freedoms) and the traditional Eastern cultures (based on relationships, hierarchy, collective responsibilities, and social harmony).[7] The multi-faceted dispute between Google and the government of the People's Republic of China reflects some of these fundamental tensions.
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
This session from the ARMA Wyoming 2016 Spring Seminar outlined the different security threats social media provides to individuals as well as organizations.
The world is adopting the new technology the need of ethics arises to sustain the proper growth and to minimize the risk of wrong uses. As technology is growing good if it is in proper hands but goes totally wrong in wrong hands.
Lecture presentation to identify sets of principles, standards, or rules that guide the moral action of an individual; illustrate morality and code of conduct; apply the ten commandments of computer ethics; determine some ethical issues in computing; analyze the relevant laws in computing; criticize and argue legal issues of Data Privacy, Cybercrime and Intellectual Property.
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
Information ethics has been defined as "the branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society".[1] The term information ethics was first coined by Robert Hauptman and used in the book Ethical challenges in librarianship. It examines the morality that comes from information as a resource, a product, or as a target.[2] It provides a critical framework for considering moral issues concerning informational privacy, moral agency (e.g. whether artificial agents may be moral), new environmental issues (especially how agents should behave in the infosphere), problems arising from the life-cycle (creation, collection, recording, distribution, processing, etc.) of information (especially ownership and copyright, digital divide, and digital rights). It is very vital to understand that librarians, archivists, information professionals among others, really understand the importance of knowing how to disseminate proper information as well as being responsible with their actions when addressing information.[3]
Information ethics has evolved to relate to a range of fields such as computer ethics,[4] medical ethics, journalism[5] and the philosophy of information.
Dilemmas regarding the life of information are becoming increasingly important in a society that is defined as "the information society". The explosion of so much technology has brought information ethics to a forefront in ethical considerations. Information transmission and literacy are essential concerns in establishing an ethical foundation that promotes fair, equitable, and responsible practices. Information ethics broadly examines issues related to ownership, access, privacy, security, and community. It is also concerned with relational issues such as "the relationship between information and the good of society, the relationship between information providers and the consumers of information".[6]
Information technology affects common issues such as copyright protection, intellectual freedom, accountability, privacy, and security. Many of these issues are difficult or impossible to resolve due to fundamental tensions between Western moral philosophies (based on rules, democracy, individual rights, and personal freedoms) and the traditional Eastern cultures (based on relationships, hierarchy, collective responsibilities, and social harmony).[7] The multi-faceted dispute between Google and the government of the People's Republic of China reflects some of these fundamental tensions.
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Shawn Tuma
Presentation to the Collin County Bench Bar Foundation's 2015 Bench Bar Conference. Focused on the latest cybersecurity trends and strategies for mitigation of cyber risk and compliance.
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
1
2
Cyber Research Proposal
Cybersecurity in business
Introduction
Because of today's international economy, securing a company's intellectual property, financial information, and good name is critical for the company's long-term survival and growth. However, with the rise in risks and cyber vulnerability, most businesses find it difficult to keep up with the competition. Since their inception, most companies have reported 16% fraud, 37.7% financial losses, and an average of over 11% share value loss, according to data compiled by the US security. Most corporations and governments are working hard to keep their customers and residents safe from harm. There are both physical and cybersecurity risks involved with these threats. According to a recent study, many company owners aren't aware of the full scope of cybersecurity. People who own their businesses must deal with various issues daily.
Nevertheless, steps are being taken to address these issues. Customers and the company are likely to be protected by the measures adopted. Cybersecurity is one of the most pressing issues facing organizations today. Leaks of a company's intellectual property and other secrets may have devastating effects on its operations, as competitors and rivals will do all in their power to stop them. is an excellent illustration of this. This is perhaps the most talked-about security compromise of the year [footnoteRef:3]. The firm was severely damaged because of this. [1: "Database security attacks and control methods."] [2:q "Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns."] [3: "The Equifax data breach: What cpas and firms need to know now." ]
Some individuals take advantage of clients by stealing highly important information to profit financially from their actions. For example, if the wrong individuals get their hands on your credit card information, you're in serious trouble since you might lose money. Some families lose all their resources, while others are forced to declare bankruptcy after being financially stable for a long period. Many of the findings of this study will be focused on cybersecurity and the sources of cybersecurity risks. The paper outlines a few of the issues and solutions that organizations may use to keep their operations and consumers safe from exploiting dishonest individuals.
Research question
According to the most recent study, more than 1500 companies have been exposed to some cybersecurity assault[footnoteRef:4]. This research details the specific types of attacks that have occurred. Organizational operations are affected, as is corporate governance, and the internal management of financial status is rendered ineffective due to these assaults. The question that will be investigated during the study is: [4: "Towards blockchain-based identity and access management for internet of things in enterprises."]
How doe ...
05.15.2018 Mitigating Cyber Breach Liability for Companies and Board MembersExpert Webcast
MAJOR TOPICS:
Cyber breach preventative strategies
Cyber written policies and procedures
Response during and after a cyber crisis
GDPR
Third-party vendor issues
Best practices for the middle market
Corporate and board best practices
Cyber Insurance
Transactional effects and deal due diligence
Notable legal precedent
My presentation at the Lehigh Carbon Community College (LCCC) NSA GenCyber Cyber Security Day event that is intended to foster an interest in the cyber security field amongst college students.
2014 Tech M&A Monthly - Myths, Misconceptions, & MisinformationCorum Group
In today's M&A market, it's not hard to find advice about how to sell a company. Unfortunately, a lot of it is wrong. And not simply wrong, but potentially damaging, not just to your M&A prospects but to your company's future. In the June edition of Tech M&A Monthly, join us as we take a look at why so much of the advice you're getting consists of myths, misconceptions and misinformation that put your company's value at risk.
Plus, news from the latest deals, a detailed look at how another of the Top Tech Trends, Information Security is driving transactions, plus the key deals, trends and valuations from the last month.
The importance of information security nowadaysPECB
Nowadays living without access to the information of interest at any time, any place through countless types
of devices has become unimaginable. However, its security has become more important than information
access itself. In fact today information security rules the world…! Why?
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
In the last year, hacker techniques have become even more sophisticated and every business’ threat landscape has widened making companies increasingly vulnerable to cyberattacks and breaches. The average cost of a data breach today in the United States is ~$8.19 Million. Ransomware attacks occur every 11 seconds. Cybercriminals are ready – exploiting employees working from home and companies operating on unsecured networks.
Withum cybersecurity expert Matthew Ferrante and Eric Jackson discussed how organizations can successfully reduce the likelihood of compliance failures and mitigate the impact of cybersecurity incidents. They were joined by Capital One Commercial Bank Treasury Management Lead Stephen Susnak, who discussed how to build more effective defenses against payments fraud.
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
Highlights of Chuck Brooks thought leadership writings, articles, and speeches on topics of cybersecurity, homeland security and emerging technologies.
I'm looking for a position in cyber security sales. Experienced in channel, marketing, direct sales to the Federal Civilian and Commercial Sectors. Located in Columbia, MD, between DC and Baltimore
Similar to Cyber Security Basics for the WFH Economy (20)
Frequently Asked Questions on the judgment of the Court
of Justice of the European Union in Case C-311/18 - Data
Protection Commissioner v Facebook Ireland Ltd and
Maximillian Schrems
A 53-count third-superseding indictment (the “Indictment”) was unsealed today in federal court in Brooklyn charging sports marketing executives Hernan Lopez and Carlos Martinez, formerly of 21st Century Fox, Inc. (“Fox”); Gerard Romy, former co-CEO of Spanish media company Imagina Media Audiovisual SL (“Imagina”); and Uruguayan sports marketing company Full Play Group S.A. (“Full Play”) (collectively, the “New Defendants”) with wire fraud, money laundering and related offenses – including, as to Romy and Full Play, racketeering conspiracy – in connection with the government’s long-running investigation and prosecution of corruption in organized soccer.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
ADR in criminal proceeding in Bangladesh with global perspective.
Cyber Security Basics for the WFH Economy
1. Navigating COVID-19
Issues: Cyber Security
Basics for the Work
From Home Economy
Presented by the Internet and Privacy
Law Standing Committee of the
Business Law Section and the Antitrust,
UCL and Privacy Committee
2. MODERATORS
Bennet Kelley
Founder
Internet Law Center
Vice Chair
Internet & Privacy Law
Committee, Business Law Section
@InternetLawCent
Full Bio in
Appendix
Brett Cook
US Privacy Manager,
Wells Fargo
Antitrust, UCL and Privacy
Committee
3. OUR PANELISTS
Terence Goggin
Specialist Leader, Risk &
Financial Advisory, Federal
Cybersecurity Practice
Deloite
Marcus Morissette
Senior Privacy &
Cybersecurity Advisor
Fenwick & West
Stan Stahl, Ph.D
President
SecureTheVillage
@stanstahl
Full Bio in
Appendix
4. MARCH 19, 2020 – CALIFORNIA ISSUES
SHELTER IN PLACE ORDER
The California State Public Health Officer and Director of the California
Department of Public Health is ordering all individuals living in the State
of California to stay home or at their place of residence, except as
needed to maintain continuity of operation of the federal critical infrastructure
sectors, critical government services, schools, childcare, and construction,
including housing construction.
In 2018, approximately 1.1 million Californians worked from home (six percent of the work force).
While some businesses had work from home policies and procedures in place, the rest are about to
become . . .
5. “An entrepreneur is
someone who will jump
off a cliff and assemble an
airplane on the way
down.”
-- Reid Hoffman
Founder, LinkedIn
6. EMPLOYMENT LAW CONSIDERATIONS
New Hires/ I-9
Tracking hours and breaks
Safety issues
Telecommuting Expenses
Insurance
WFH v Working Remotely
Friday Donuts
Photo by Court Cook on Unsplash
NOT
COVERED
HERE
7. SECURING THE HOME OFFICE
Part 1: Securing the Network
Ensure all devices used have
Properly configured firewalls
Up-to-date Anti-malware, intrusion prevention software
Complex Passwords
Ensure software used is properly licensed
Secure devices and services with multi-factor authentication
Use of Virtual Private Networks
Interplay with Home IoT Devices
IT Log monitoring
Photo by Paul
Hanaoka on Unsplash
8. SECURING THE HOME OFFICE
Part 2 – Securing Proprietary Information
Company v Employee Devices
Employer Monitoring
Tracking Hours Worked
(Important for Wage/Hour Issues)
Tracking Downloads and Emails
Encryption
Data Backup
Account Settings and Access
9. Sony hack relied upon low-tech spear-phishing
emails. Employees are the weak link in
cybersecurity defense.
• Avoid clicking on links in unsolicited emails
and be wary of email attachments.
• Do not reveal personal or financial
information in emails, and do not respond to
email solicitations for this information.
SECURING THE HOME OFFICE
Part 3 – Employee Training
10. CORONAVIRUS
SCAMS
• “Public Health” Scams
• Government Check
Scams
• Business Email Scams
• I.T. Scams
• Supply Scams
• Robocall Scams
• Data Scams
11. CORONAVIRUS CYBER THREATS
• Italy Saw Significant Spike in Cyber Attacks
• Remote User Credential Theft
• Malicious Log in Events
• Fake Coronavirus Websites/ Maps
• Phishing Attacks Using Coronavirus Themes
• Fake Phone Apps
• Coronavirus Themed Domains
• Ransomware Attacks on Medical Institutions
12. CORONAVIRUS INFORMATION WEBSITES
Center for Disease Control and
Prevention
https://www.cdc.gov/coronavirus/2019-
ncov/index.html
@CDCgov
California Dep’t of Public Health
https://www.cdph.ca.gov/Programs/CID/
DCDC/Pages/Immunization/ncov2019.as
px
@CAPublicHealth
World Health Organization
https://www.who.int/emergencies/disease
s/novel-coronavirus-2019
@WHO
14. BRETT COOK – Wells Fargo
Brett joined the US Navy Judge Advocate General’s (JAG) Corps in 2005. He served as Associate
General Counsel & Senior Privacy Counsel for US Naval bases in the European Union, the Bureau of
Navy Medicine and Surgery, and the Navy’s Expeditionary Operations Command. Subsequently, he
was selected to manage the Navy’s data protection enforcement and Freedom of Information Act
compliance programs.
Brett served as General Counsel & Chief Privacy Officer for an Aircraft Carrier Strike Group, which
manages forward-operating surface vessels, aviation units, and intelligence collection operations; and
the Naval Intelligence Forces Reserve, which oversees Cryptology, Intel, and IT communities across
134 global organizations. He has extensive experience operationalizing regulations, developing
foundational compliance policies, conducting privacy impact assessments and training programs.
Currently, Brett is a US Privacy Manager for Wells Fargo and continues to serve as a US Navy JAG
Corps Reserve Officer.
15. TERENCE GOGGIN - Deloitte
Terence Goggin is a consultant and entrepreneur with deep expertise in all aspects of
offensive and defensive cyber operations. He is the founder of PocketMac, a
groundbreaking Macintosh software company, which he built into a business
generating revenues of more than $2M per year. He has held a variety of
cybersecurity and leadership roles at the US Department of Defense. In his current
role, he advises government and private organizations on matters of cybersecurity
and risk management.
16. BENNET KELLEY – Internet Law Center
Bennet founded the Internet Law Center in 2007 after working in-house with technology, e-commerce, and internet
advertising companies such as ETM Entertainment Network, Network Commerce and ValueClick for nearly a decade. He
has been named as among the nation's top internet lawyers by several publications including the Los Angeles Business
Journal which named him one of the Most Influential Lawyers in Digital Media and E-Commerce.
In 2019, Bennet was one of a handful of lawyers, academics, prosecutors, law enforcement and judicial personnel invited to
work with the Department of Justice on addressing ways to combat technologically enabled harassment.
In 2012, he was selected by the U.S. Department of Commerce to be part of the U.S. delegation and present on e-
commerce law at the 17th U.S.-China Legal Exchange. The prior year he was part of a delegation of a dozen North
American internet experts who met with leading Chinese netizens to promote greater freedom within China.
Bennet was also the creator and host of Cyber Law and Business Report which aired on WebmasterRadio.fm from 2011-
2019 and was nominated for a Los Angeles Press Club award.
Bennet is a past Co-Chair (and current Vice Chair) of the California Lawyers' Association's Internet and Privacy Law
Committee where he led the effort to develop a primer on cyberspace law for state policymakers. He also led the
Technology, Internet and Privacy subcommittee of CLA's Intellectual Property Section from 2016-2019.
17. MARCUS MORISSETTE – Fenwick & West
Marcus Morissette is a Senior Privacy and Cybersecurity Advisor at Fenwick & West.
Marcus has experience leading successful privacy teams through the design and implementation of global privacy and data
governance programs, ensuring compliance with domestic and GDPR regulations. Prior to joining Fenwick, Marcus worked
with eBay, first as the Head of Privacy for eBay Marketplaces, and then as eBay Inc.’s Chief Privacy Officer, leading all
global privacy operations for the company and its associated entities. Marcus also has a seasoned background as an
attorney and corporate counsel to various technology companies where he managed regulatory and compliance matters
including privacy assessments, data security audits, and reduced risk exposure efforts. He has experience completing data
mapping and data inventories of large and complex data environments. He has significant practical information security
experience, having been a certified information security professional, PCI qualified security assessor, and certified
information systems auditor. Marcus also serves as an officer and lawyer in the US Navy Reserve Judge Advocate
General Corps, and holds an active government security clearance.
Marcus received his J.D. from the University of Idaho College of Law. He received his B.A. in Economics from the
University of Maryland.
Marcus is a Fellow of Information Privacy (FIP), Certified Privacy Professional US (CIPP/US), Certified Information Privacy
Technologist (CIPT) and a Certified Information Privacy Manager (CIPM), Certified Information Systems Security
Professional (CISSP). He is licensed to practice law in Washington State.
18. STAN STAHL, Ph.D. - SecureTheVillage
Dr. Stan Stahl is founder and President of SecureTheVillage, a non-profit providing executives the knowledge and relationships they need to
meet today’s cyber crime, cyber privacy and information security challenges.
Stan is also co-founder and President of Citadel Information Group, an information security management services firm recently acquired by
Top-100 CPA firm, Miller Kaplan. The firm delivers Information Peace of Mind ® to business and the not-for-profit community.
Stan serves on the California Cybersecurity Task Force; the Industry Advisory Board of the Information Technology Program at the Viterbi
School of Engineering at USC; the Advisory Board of UCLA Extension’s Emergency Management & Homeland Security and Enterprise Risk
Management Programs; and the Board of Directors of the Content Delivery & Security Association.
A pioneer in the field of information security, Stan began his career securing teleconferencing at the White House, databases inside Cheyenne
Mountain and the communications network controlling our nuclear weapons arsenal. Stan received his Ph.D. degree in mathematics from The
University of Michigan. A frequent speaker on cybersecurity, Stan is regularly quoted in the media on cybercrime, cyber privacy and information
security.
Dr. Stahl earned his Ph.D. in mathematics from The University of Michigan and spent nearly 15 years teaching university mathematics. Once an
active researcher, Dr. Stahl has published more than a dozen papers in advanced mathematics and computer science. He has taught courses
in information security, software engineering, project management and computer programming at several universities and colleges. He recently
served on the faculty at the University of Southern California in the School of Engineering’s Information Technology Program.
21. CYBERSECURITY RESOURCES - 1
Department of Commerce
National Institute of Standards and Technology
• Telework Security Basics
• Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security
• User’s Guide to Telework and Bring Your Own Device (BYOD) Security
• Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions
Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
• Risk Management for Novel Coronavirus (COVID-19)
• Alert (AA20-073A): Enterprise VPN Security
• Security Tip (ST04-014): Avoiding Social Engineering and Phishing Attacks
22. CYBERSECURITY RESOURCES - 2
Federal Trade Commission
• Online security tips for working from home
•
• Cybersecurity For Small Business
Center for Internet Security
• CIS Controls Telework and Small Office Network Security Guide
Electronic Frontier Foundation
• Phishing in the Time of COVID-19: How to Recognize Malicious Coronavirus Phishing Scams
Stay Safe Online
• COVID-19 Security Resource Library
23. CORONAVIRUS SCAM RESOURCES
Department of Homeland Security
Cybersecurity and Infrastructure Security Agency
• Defending Against COVID-19 Cyber Scams
Federal Trade Commission
• Coronavirus: Scammers follow the headlines|
• FTC: Coronavirus scams, Part 2
• Seven Coronavirus scams targeting your business
• Scammers are taking advantage of fears surrounding the Coronavirus
Better Business Bureau
• BBB tips on COVID-19 (coronavirus)