A CEO’s Operating System: Architecting a Culture of Strategic Transparency and Inspiration

The operating system of the company is culture. Culture eats strategy for breakfast.  The CEO is the architect of the company and what it should look like so that you can do your life’s work and feel empowered by inspiration, not manipulation.  By definition, the CEO should have the most reports because the people reporting […]

A CEO’s Operating System: Architecting a Culture of Strategic Transparency and Inspiration Read More »

Ondrej Krehel Invited as Expert Witness by S.D.N.Y. in Donziger Case

The Chevron RICO case was a dispute over alleged environmental damage in Ecuador, with financial stakes amounting to billions of dollars. Chevron accused the plaintiffs and their legal team of fraud and racketeering to obtain a $9.5 billion judgment against the company. This led to a U.S. court ruling in Chevron’s favor under the Racketeer

Ondrej Krehel Invited as Expert Witness by S.D.N.Y. in Donziger Case Read More »

Guiding Principles for Effective Cybersecurity Leadership

Guiding an organization toward heightened cybersecurity awareness is often a challenging task for both employees and leaders. As a leader, your role involves setting clear objectives, creating a strategic plan, and efficiently utilizing human resources to bring about sustainable change. Fortunately, you likely already have many of the necessary skills and characteristics to succeed. The

Guiding Principles for Effective Cybersecurity Leadership Read More »

The Critical Role of Email Encryption in Safeguarding Corporate Data

As of 2023, the trend of remote work has further entrenched itself in the business world, amplifying the exchange of confidential information online. This surge includes the transmission of sensitive data like client details, passwords, and internal communications, primarily through emails. This scenario heightens the potential security risks for companies, regardless of their cybersecurity measures,

The Critical Role of Email Encryption in Safeguarding Corporate Data Read More »

Transitioning to the Cloud? Watch out for these Cyber Threats

The shift to cloud computing is a major trend in business operations, communication, and transactions. In the years leading up to, and especially after the pandemic, many businesses have transitioned their operations to cloud-based solutions, adopting remote or hybrid work models. The cloud offers scalability, flexibility, and innovation, crucial for maintaining a competitive edge. Yet,

Transitioning to the Cloud? Watch out for these Cyber Threats Read More »

Documenting Incident Response Processes: A Perspective by Ondrej Krehel

Understanding the significance of meticulously documenting incident response processes is crucial. Cybersecurity incidents range from sophisticated ransomware attacks to seemingly innocuous email attachments. Ondrej Krehel, a seasoned cybersecurity practitioner, emphasizes that preparation is key. Without adequate knowledge and documentation, businesses can suffer significantly from breaches. Documenting the incident response process serves multiple functions. It delineates

Documenting Incident Response Processes: A Perspective by Ondrej Krehel Read More »

Are You Ready for a Ransomware Attack? Here’s What You Need to Know

Ransomware continually poses a serious threat to cybersecurity, with frequent high-profile attacks. This is a pressing issue for businesses of all sizes, prompting them to consider how to prepare for a likely ransomware incident. Formulating an effective response to ransomware involves steps such as prevention, preparation, detection, verification, containment, eradication, and recovery. Utilizing comprehensive Ransomware

Are You Ready for a Ransomware Attack? Here’s What You Need to Know Read More »

Techniques Used by Attackers to Bypass MFA in 2023

Multi-factor authentication (MFA) is widely acknowledged as a key defense mechanism in the battle against cyberattacks. Notably, major organizations like Microsoft tout MFA’s effectiveness, claiming it can prevent nearly all automated attacks and significantly reduce identity theft risks compared to password-only security. This effectiveness has led to a broad embrace of MFA, evident in its

Techniques Used by Attackers to Bypass MFA in 2023 Read More »

Cybersecurity Challenges for Law Firms in 2023

In 2023, law firms continue to navigate a complex landscape of cybersecurity threats and evolving regulations. While technological integration has streamlined many legal processes, it has also increased vulnerability to cyber risks. The legal industry, particularly law firms, faces unique cybersecurity challenges requiring proactive and comprehensive strategies. Recent Trends and Threats The “Security at Issue:

Cybersecurity Challenges for Law Firms in 2023 Read More »