Jed Davis authored the article, "Cybersecurity for the Under-Resourced" for Bloomberg BNA. In the article, Davis dispels the misconception that only organizations wealthy enough to buy the newest technologies are in position substantially to improve their cybersecurity. "A successful cybersecurity improvement effort depends more on the willingness of an organization's leadership to revamp work procedures to reduce information technology-borne risk than on the resources the organization has to devote to the effort," Davis writes. Davis emphasizes that cost-effective measures available to nonprofits and other under-resourced entities include making an "unflinching inventory" of what data they amass and what they can safely purge, honing realistic incident response plans, mandating security awareness training and contracting for at least intermittent vulnerability testing.
Day Pitney White Paper
On September 13, Jed Davis was a featured panelist on a webinar, "The Threat at Your Doorstep: Why You Should be Using Cyber Threat Sharing," produced by Thomson Reuters.
Day Pitney Alert
Day Pitney LLP, together with the State of Israel and PDB FutureCom International, hosted a unique, invitation-only Startup Program for early-stage cybersecurity and analytics investors at the Cornell Club of New York.
Steven Cash and Naju Lathia authored an article, "Pitching Your Cybersecurity Case to Law Enforcement Agencies," published by the New York Law Journal.
Day Pitney Press Release
Jed Davis was quoted in a feature article, "The Privacy Fight For Digital Data Warrants Is Just Starting," published by Law360.
Steven Cash was quoted in an article, “Mystery in Mueller Probe: Where’s the Hacking Indictment?,” published by The Hill.
Jed Davis was quoted in an article, “Phantom Arrest Shows Tech Cos. Must Police Own Products,” published by Law360.
Day Pitney and the National Governors Association (NGA) hosted an invitation-only forum, held at the Downtown Harvard Club of Boston, that brought together lawyers, policymakers, cybersecurity experts and other participants to identify and discuss legal issues related to the growing Industrial Internet of Things (IIoT).