Full Article
Full Article

Seventeen prominent players reflect on the decades of war they helped wage and the domestic defenses they helped erect.

Full Article

For Michael Chertoff, former US secretary of Homeland Security from 2005 to 2009, the fact that America has not experienced a single attack by foreign terrorists since 9/11 proves that the US was "successful" in its strategy to prevent terrorism.

Full Article

On September 11, 2001, 19 terrorists executed a horrific plan to hijack aircraft and turn them into guided missiles that destroyed the World Trade Center, damaged the Pentagon, and killed approximately 3,000 people.  In carrying out their plot, the terrorists exploited vulnerabilities or gaps in several security systems that were intended to protect our borders and our aviation system. 

Full Article

As Congress considers how to increase competition for app stores run by Apple, Google and others, it also needs to consider potential cybersecurity threats.

Full Article
Full Article
Full Article
Brogan Ingstad & Jayson Ahern

How to Navigate Today’s Supply Chain Security

If you are a company doing business in Mexico, these have not been easy times. A converged economic, security, and health crisis has disrupted business operations and upended the country’s workforce. Splintering drug cartels continue to proliferate and adapt their tactics, techniques, and procedures (TTPs) to the pandemic. The U.S.-Mexico border, one of the largest and most important economic corridors in the world, has been politicized continuously over the last four years, with periodic threats of closure.

Full Article

ENTERPRISE CYBERSECURITY MEASUREMENT

On Feb. 4, 2021, the New York State Department of Financial Services issued guidance on the cyber insurance market to foster more robust industry approaches to “managing and reducing the extraordinary risk we face from cyber intrusions.” Critical elements of that guidance include expectations that insurance companies should “rigorously measure insured risk” and “incentivize the adoption of better cybersecurity measures by pricing policies based on the effectiveness of each insured’s cybersecurity program.”

Full Article
Schedule a Consultation

Contact us today to learn what we can do for you.

Schedule a Consultation