{"id":248,"date":"2019-07-18T08:49:04","date_gmt":"2019-07-18T14:49:04","guid":{"rendered":"https:\/\/www.jcolvinlaw.com\/?page_id=248"},"modified":"2019-07-22T12:43:32","modified_gmt":"2019-07-22T18:43:32","slug":"blog","status":"publish","type":"page","link":"https:\/\/www.jcolvinlaw.com\/?page_id=248","title":{"rendered":"Security Blog"},"content":{"rendered":"\n<pre class=\"wp-block-code\"><code>\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/www.jcolvinlaw.com\/?p=238\">What to Tell the Board of Directors About Security and Privacy<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>What the board must know in two main points: 1) Your organization must have written policies and procedures to reasonably detect and mitigate cyber security incidents, and; 2) Don\u2019t let your technical staff decide what level of risk your organization is to accept.<\/p>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=5\" rel=\"category\">Security Blog<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/www.jcolvinlaw.com\/?p=238#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/www.jcolvinlaw.com\/?p=231\">Vendor Contract Checklist<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Don\u2019t forget to include a review of your contracts with vendors when reviewing your own security compliance. Here is the short version of my checklist for vendor contracts:<\/p>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=5\" rel=\"category\">Security Blog<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/www.jcolvinlaw.com\/?p=231#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/www.jcolvinlaw.com\/?p=133\">5 types of \u201csecurity audits\u201d<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>We are often told by clients that they want a security audit. The word \u201caudit\u201d is often inappropriate. Here are five types of security evaluations and their goals and audiences: 1) Vulnerability Tests 2) Penetration Tests 3) Risk Assessments 4) Compliance Audits 5) Due Diligence Questionnaires<\/p>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=5\" rel=\"category\">Security Blog<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/www.jcolvinlaw.com\/?p=133#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/www.jcolvinlaw.com\/?p=129\">After the Breach: Legal and Technical Issues<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Long before it actually happens, every organization should prepare for when their networks are breached. Do you even know what you have to do? This presentation will discuss legal notification requirements and some of the technical solutions that reduce the reporting requirements and protect your firm. This discussion is intended to familiarize CIOs and staff [&hellip;]<\/p>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=4\" rel=\"category\">Papers<\/a>, <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=5\" rel=\"category\">Security Blog<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/www.jcolvinlaw.com\/?p=129#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/www.jcolvinlaw.com\/?p=123\">Information Classification Should Drive IT Planning<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>Information classification is an integral part of implementing an information security framework and performing risk assessments. Proper classification leads to the selection of appropriate controls. When the goal of information security is to protect, how can this be done without knowing what value differing information types have to the organization? What\u2019s more, information classification can [&hellip;]<\/p>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=4\" rel=\"category\">Papers<\/a>, <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=5\" rel=\"category\">Security Blog<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/www.jcolvinlaw.com\/?p=123#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n\n<!-- NOTE: If you need to make changes to this file, copy it to your current theme's main\n\tdirectory so your changes won't be overwritten when the plugin is upgraded. -->\n\n<!-- Post Wrap Start-->\n<div class=\"post hentry ivycat-post\">\n\n\t<!-- \tThis outputs the post TITLE -->\n\t<h2 class=\"entry-title\"><a href=\"https:\/\/www.jcolvinlaw.com\/?p=263\">DKIM &#8211; Domainkey Identified Mail<\/a><\/h2>\n\n\t<!-- \tThis outputs the post EXCERPT.  To display full content including images and html,\n\t\treplace the_excerpt(); with the_content();  below. -->\n\t<div class=\"entry-summary\">\n\t\t<p>DKIM FAQs<\/p>\n\t<\/div>\n\n\t<!--\tThis outputs the post META information -->\n\t<div class=\"entry-utility\">\n\t\t\t\t\t<span class=\"cat-links\">\n\t\t\t\t<span class=\"entry-utility-prep entry-utility-prep-cat-links\">Posted in<\/span> <a href=\"https:\/\/www.jcolvinlaw.com\/?cat=5\" rel=\"category\">Security Blog<\/a>\t\t\t<\/span>\n\t\t\t<span class=\"meta-sep\">|<\/span>\n\t\t\t\t\t\t<span class=\"comments-link\">\n\t\t\t<a href=\"https:\/\/www.jcolvinlaw.com\/?p=263#respond\">Leave a comment<\/a>\t\t<\/span>\n\t\t\t<\/div>\n<\/div>\n<!-- \/\/ Post Wrap End -->\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page_blog.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=\/wp\/v2\/pages\/248"}],"collection":[{"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=248"}],"version-history":[{"count":5,"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=\/wp\/v2\/pages\/248\/revisions"}],"predecessor-version":[{"id":262,"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=\/wp\/v2\/pages\/248\/revisions\/262"}],"wp:attachment":[{"href":"https:\/\/www.jcolvinlaw.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}