What Are Social Engineering Attacks? How Can You Protect Yourself? – A Faegre Drinker on Law and Technology Podcast

Share

Social engineering attacks are at the core of all cyberattacks, as threat actors use many different types of psychological manipulation to kick off their cyberattacks. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss welcomes Peter Baldwin — who focuses his practice in white collar criminal investigations and cyber-incident response — and they explore the ins and outs of social engineering attacks, how to identify them and how to defeat them.

In this episode with a special twist, Pete takes the “host microphone” and chats with Jason, who takes on the role of podcast guest tackling a number of questions, including:

  • What are the main underlying pillars of a social engineering attack? What is their foundation and what makes them successful?
  • How do the more common social engineering attacks work? Such as phishing, spear phishing, whaling, business email compromises, dumpster diving, smishing, vishing, catfishing, gas lighting and SIM swapping?
  • What are the top targets in health care, financial services and manufacturing?
  • What are some good defenses to help people prevent many of the more common social engineering attacks?

Progress on Federal Privacy Legislation, but Still a Long Way to Go

Share

A bipartisan group of legislators in Washington, D.C., recently released a discussion draft of a federal privacy bill — the American Data Privacy and Protection Act (ADPPA). This draft bill reaches compromise positions on two key issues that have been the largest obstacles to passing such legislation: state preemption and a private right of action. This discussion draft preempts most comprehensive state privacy laws and includes a narrow and limited private right of action. The compromises on these issues in the bill, however, are likely to draw criticism from both Democrats and Republicans, along with industry and privacy advocates.

Continue reading “Progress on Federal Privacy Legislation, but Still a Long Way to Go”

Russia, Cybersecurity & Government Contracting – Faegre Drinker on Law and Technology Podcast

Share

Russia’s invasion of Ukraine has created a host of challenges for the U.S. government to address, including the need to prepare for potential Russian cyberattacks and questions about how to handle Russian connections to supply chains and government contracts. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Faegre Drinker partners Dana Pashkoff and Jessica Abrahams to unpack the thorny issues at the nexus of Russia, cybersecurity and U.S. government activity.

Continue reading “Russia, Cybersecurity & Government Contracting – Faegre Drinker on Law and Technology Podcast”

What Is Algorithmic Bias? Why Is It Important? – Faegre Drinker on Law and Technology Podcast

Share

Chances are good that your organization uses algorithms or artificial intelligence to help make business decisions — and that regulatory efforts targeting these automated decision-making systems, including their potential to produce unintended bias, have caught your attention. In this episode of the Faegre Drinker on Law and Technology Podcast, host Jason G. Weiss sits down with Bennett Borden, Faegre Drinker’s chief data scientist and co-founder of the firm’s artificial intelligence and algorithmic decision-making (AI-X) team, to discuss algorithmic bias and what companies should know about the latest regulatory developments.

Continue reading “What Is Algorithmic Bias? Why Is It Important? – Faegre Drinker on Law and Technology Podcast”

U.S. Government Details Prolonged Cyber Scheme by Russian State Actors Targeting the Energy Sector

Share

Last month, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of Energy (DOE) issued a joint advisory providing “information on multiple intrusion campaigns conducted by state-sponsored Russian cyber actors” that targeted “U.S. and international Energy Sector organizations.” While CISA, the FBI, and DOE all responded to these campaigns “with appropriate action in and around the time they occurred,” the U.S. government determined that it was important to share information about the attacks “in order to highlight historical tactics, techniques, and procedures (TTPs) used by adversaries to target U.S. and international Energy Sector organizations.”

Continue reading “U.S. Government Details Prolonged Cyber Scheme by Russian State Actors Targeting the Energy Sector”

©2024 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Attorney Advertising.
Privacy Policy