Security is no longer optional for law firms. A @goclio Guide: 12 Steps to Cybersecurity. http://ow.ly/4ndPzT https://t.co/X9RIdA9BXA
— $Jack Newton (@goclio) May 2, 2016
Happy Nat'l Small Business Week! View today's #MSFTLaunch video on #cybersecurity here: http://msft.it/6010BWBWo #DreamSmallBiz
— $Cindy Bates (@Cindy_Bates) May 2, 2016
Report Cards; EFRPs; Market Disruption; HFT; Algorithmic #Trading; #Cybersecurity [VIDEO] http://ow.ly/4nkFDg @kattenlaw #finance #SEC
— $Jennifer Schaller (@natlawreview) May 2, 2016
Cybersecurity issues and advice steal the Techshow http://puls.ly/GZoxwA #legaltech https://t.co/ZUwvRHPKt7
— $Legal Tech Aid (@Legal_Tech_Aid) May 1, 2016
RT @TimCushing: Federal cybersecurity policy: still Y2K-compliant! http://www.nextgov.com/cybersecurity/2016/04/senators-call-white-house-speed-cybersecurity-guidance/127831/ https://t.co/bQIh0NyoZL
— $Ron Coleman (@RonColeman) April 27, 2016
Federal cybersecurity policy: still Y2K-compliant! http://www.nextgov.com/cybersecurity/2016/04/senators-call-white-house-speed-cybersecurity-guidance/127831/ https://t.co/bQIh0NyoZL
— $Tim Cushing (@TimCushing) April 27, 2016
Unprotected Lawyers are Prime Targets for Hackers. 12 Steps to Cybersecurity for Law Firms. http://ow.ly/4naCPj https://t.co/4974CSJ6xk
— $Jack Newton (@goclio) April 27, 2016
RT @TeachPrivacy: Our information security training poster https://www.teachprivacy.com/information-security-training/ #infosec #cybersecurity #privacy https://t.co/16IadU1Va0
— $Daniel J. Solove (@DanielSolove) April 27, 2016
RT @attnyatwork: How does your cybersecurity compare to other practices? Simon Chester explains our survey results http://bit.ly/1VSnOot
— $Suzanne E. Deliscar (@suzannedeliscar) April 27, 2016
What the butterfly effect tells us about how to get more women into cyber: #humansofcybersecurity https://context.newamerica.org/what-the-butterfly-effect-teaches-us-about-cybersecuritys-diversity-problem-5d0563c9a3aa#.8cw2pdxn0
— $Anne-Marie Slaughter (@SlaughterAM) April 27, 2016
How does your cybersecurity compare to other practices? Simon Chester explains our survey results http://bit.ly/1VSnOot
— $Attorney at Work (@attnyatwork) April 27, 2016
A recent in-house counsel survey points to persistent cybersecurity gaps; how does your company measure up? http://www.jdsupra.com/legalnews/survey-says-new-trends-from-corporate-26316/
— $JD Supra (@JDSupra) April 27, 2016
Our information security training poster https://www.teachprivacy.com/information-security-training/ #infosec #cybersecurity #privacy https://t.co/16IadU1Va0
— $TeachPrivacy (@TeachPrivacy) April 27, 2016
FBI now goes on record and says it ain't got the techy details of iPhone exploit, so can't reveal to Apple https://www.politicopro.com/cybersecurity/whiteboard/2016/04/fbi-says-it-lacks-technical-knowledge-of-iphone-hack-071162
— $Tony Romm (@TonyRomm) April 27, 2016
Cybersecurity And #SmallBusiness http://www.smallbusinessconnection.com/technology/cybersecurity-and-small-business#.VyD7cn_pLN8.twitter
— $Steve Strauss (@SteveStrauss) April 27, 2016
Cybersecurity and Employee Benefit Plan Fiduciary Duties: Going Beyond HIPAA http://www.jdsupra.com/legalnews/cybersecurity-and-employee-benefit-plan-77521/
— $JD Supra (@JDSupra) April 27, 2016
Why are so many Mormon women choosing to make a name for themselves in cybersecurity? http://j.mp/1T4Pboh
— $Kate Gardiner (@KateGardiner) April 27, 2016
The Burr-Feinstein Crypto Bill Would Gut Our Cybersecurity. Crypto Fellow @Riana_Crypto explains why. http://stanford.io/1UfFvNb
— $Stanford CIS (@StanfordCIS) April 27, 2016
Former Sony litigation chief rejoins Buchalter #CYBERSECURITY http://at.law.com/GVkatY via @RecorderTweets
— $Amanda Bronstad (@abronstadlaw) April 27, 2016
Cell phones are like snitches in your pocket #cybersecurity #privacy
— $Shaun Jamison (@shaunjamison) April 27, 2016
RT @ModernCounsel: “If cybersecurity isn’t in your top three priorities, it should be,” says Greg McShea, senior VP & GC of @Janney1832 http://buff.ly/1WRAPxu
— $Beverly Michaelis (@OreLawPracMgmt) April 27, 2016
RT @IproTech: Cybersecurity Threats & Client Confidential Data: Navigating Risks & Ethical Obligations @TSCSedona #IproInnovations https://t.co/4x7D4TQY7E
— $Beverly Michaelis (@OreLawPracMgmt) April 27, 2016
Hacker are all about customer service. Lanterman #cybersecurity #cybercrime
— $Shaun Jamison (@shaunjamison) April 27, 2016
Criminals buy local cards to avoid detection #cybersecurity #cybercrime Lanterman
— $Shaun Jamison (@shaunjamison) April 27, 2016
"When we gain convenience, we lose security" Mark Lanterman #cybersecurity
— $Shaun Jamison (@shaunjamison) April 27, 2016
At Cyberthreats CLE #cybersecurity
— $Shaun Jamison (@shaunjamison) April 27, 2016
RT @bswavely: For growing number of hacked hospitals, #Cybersecurity is wealth http://cnb.cx/1MU1uaX
— $Shaun Jamison (@shaunjamison) April 27, 2016
VEHICLE CYBERSECURITY: DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding ... http://ow.ly/8JPool
— $Monique Herbst Altheim (@AltheimPrivacy) April 26, 2016
Top U.S. universities failing at cybersecurity education http://www.csoonline.com/article/3060878/security-awareness/top-u-s-universities-failing-at-cybersecurity-education.html via @csoonline
— $Daniel J. Solove (@DanielSolove) April 26, 2016
FBI unlikely to tell Apple how it hacked into shooter's phone http://thehill.com/policy/cybersecurity/277724-fbi-unlikely-to-tell-apple-how-it-hacked-into-shooters-phone
— $LLRX (@LLRX) April 26, 2016
Cybersecurity: Overview Reports and Links to Government, News, and Related Resources http://www.bespacific.com/cybersecurity-overview-reports-links-government-news-related-resources/
— $beSpacific Updates (@beSpacific) April 26, 2016
Cybersecurity Threats & Client Confidential Data: Navigating Risks & Ethical Obligations @TSCSedona #IproInnovations https://t.co/4x7D4TQY7E
— $Ipro (@IproTech) April 26, 2016
“If cybersecurity isn’t in your top three priorities, it should be,” says Greg McShea, senior VP & GC of @Janney1832 http://buff.ly/1WRAPxu
— $Modern Counsel (@ModernCounsel) April 26, 2016
Report: Big Data behavior analytics can boost cybersecurity https://lnkd.in/eXCFgda
— $Richik Sarkar (@RichikXSarkar) April 26, 2016
BloombergLaw: #Cybersecurity Is an Enterprise Risk in M&A Deals http://on.bna.com/4n721H https://t.co/zPw355gmHa
— $Ali Ebrahimzadeh, Esq. (@PrometheusLaw) April 26, 2016
Learn how to protect yourself and your clients with "Cybersecurity: Ethically Protecting Confidential Data" (4/27): http://bit.ly/1pZgzO9
— $American Bar (@ABAesq) April 26, 2016
K&L Gates hires former head of Blank Rome's cybersecurity practice, @nellgluckman reports. http://www.americanlawyer.com/home/id=1202755928357/Jones-Day-KL-Gates-Bulk-Up-Cybersecurity-Practices?mcode=1202617075486&curindex=1
— $Gina Passarella (@GPassarellaTAL) April 26, 2016
Tomorrow's Buildings: Help! My building has been hacked - BBC News #IoT #cybersecurity http://fb.me/4k1VR6Sw3
— $Mr. Gerry J. Elman (@TechLaw_Elman) April 26, 2016
Tomorrow's Buildings: Help! My building has been hacked - BBC News #IoT #cybersecurity http://www.bbc.com/news/technology-35746649
— $Mr. Gerry J. Elman (@TechLaw_Elman) April 26, 2016
interesting chart on cost of #cybersecurity #cyber https://twitter.com/PatriciaLilyS/status/724924692591710209
— $Vali Nasr (@vali_nasr) April 26, 2016