Information asset inventory by John Bandler An information asset inventory is a listing of various information assets of an organization.…
Cybersecurity, Law, and Ethics for Lawyers: Secure Yourself, Your Family, Firm, and Clients (Oct 2023 for BKA) This is a…
Social engineering by John Bandler Here is a quick definition of the term and explanation of cybersecurity best practices. Social…
Cybersecurity for Attorneys by John Bandler Here is a short article followed by a list of resources and articles (including…
Cybersecurity, Law, and Ethics for Lawyers: Secure Yourself, Your Family, Firm, and Clients (July 2023 for NLA) This is a…
Incident response and incident response planning by John Bandler Incident response planning and incident response is an important part of…
Technology Basics by John Bandler Here is some quick information about technology because it is an integral part of cybersecurity.…
Cybersecurity for Lawyers: Secure Yourself, Your Firm, and Clients (2024 for TRTCLE) We changed the title a little bit so…
Cybersecurity, Cybercrime, Privacy, and the Law. Protect Yourself, Your Family, Your Firm, and Clients (2023) This is John’s landing page…
The Proposed UN Cybercrime Treaty and a Path Forward By John Bandler Published May 25, 2023, Law.com and the New…