With companies and law firms around the world encountering problems with how to deal with cybersecurity, it’s no surprise that a report released by the international executive search firm Boyden indicates a growing need for technology officers. Not only that, but a statement released by Tim McNamara, co-founder of Boyden’s Risk Management and Security Sector, reveals that finding technology officers who are knowledgeable about all the intricacies of cybersecurity is difficult. McNamara states, “It’s a very complicated sector with bifurcated responsibilities. Consequently, there are multiple strategies to address cybersecurity needs among the commercial, military and defense, and intelligence segments.”

Basically, each company is going to face different risks when it comes to cybersecurity, and each company needs a unique strategy to prevent cyber attacks. Companies are especially in need of technology officers that can also hold leadership positions. It’s important for executives and other officials to be tech-savvy and understand the importance of cybersecurity, since the effects of a cyber attack are not limited to the IT department. Richard Fudickar, managing partner of Boyden Germany, explains that, “management must understand that this issue is about people and behaviors, not just technology.” This involves trusting chief information security officers and and chief security officers to influence executive decisions and be an active part of senior leadership teams. Ken Rich, a partner at Boyden New York, sums it up, saying, “Companies that have embraced the strategy of giving the CISO (Chief Information Security Officer) a seat at the executive table are better equipped to prepare for any breaches in cybersecurity.”

Finding technology officers with the leadership skills necessary to fill that seat may be hard to find, though. The Boyden report indicates that more than half of companies do not feel that they employ enough security officers. Companies may have to start hiring additional technology officers to fulfill the growing need to understand cybersecurity.

Article via Legaltech News, December 1, 2015

Photo: In the Digital Age via Ohad Ben-Yoseph [Creative Commons Attribution-NonCommercial-NoDerivs]

The National Security Agency has been collecting metadata, which is information such as phone numbers and duration of calls, since shortly after the attacks of September 11. The collection of this metadata has ceased as of November 28th. So what changed?

There is a new law in place, known as the USA Freedom Act of 2015. This law is being seen as a victory for privacy activists and tech companies looking to protect their user data. The USA Freedom Act of 2015 came about as a response to the revelations of Edward Snowden, a former NSA contractor that revealed the deep surveillance of the NSA on the American people. This new law prohibits the bulk collection of phone data previously done by the NSA. Although the agency won’t keep the bulk data, investigators will still have access to these types of records when they are investigating a particular person, or targeting specific groups. The existing metadata that has been captured during the last 5 years will be kept until next February 29th in order to ensure a smooth transition.

National Security Council spokesperson Ned Price stated that this new law, “struck a reasonable compromise which allows us to protect the country while implementing various reforms”.

Some have concerns, since the new law is going into effect so soon after the terrorist attacks in Paris. At a time when America is scaling back its surveillance, countries like England and France are considering new bills to enhance surveillance. Since American companies like Verizon would be involved, it may mean the creation of new treaties between Great Britain and the United States.  It is likely that this type of confounding circumstance will present itself more in the future due to the international nature of terrorism.

Article via ABAJournal, 30 November 2015

Photo: National Security Agency Seal via Donkey Hotey [Creative Commons Attribution-NonCommercial-NoDerivs]