Lawline recently posted a profile of Scott Aurnou, founder of The Security Advocate. In it, Scott talks about combining a cyber security and legal background, as well as his interests outside of the office.
Getting to Know Scott Aurnou
Posted in Uncategorized
What Is Your “Attack Surface” and Why Does It Matter?
Scott Aurnou, Esq., CISSP discusses the importance of understanding your organization’s potential exposure to online (and other) attacks in this excerpt from the Lawline program The NY SHIELD Act: What You and Your Clients (In and Out of NY State) Should Know. The full program is available here:
Posted in Cloud Security, Fraud & Scams, Laptops & Desktops, Network Security
Multi-Factor Authentication and the NY DFS Cybersecurity Regulation
Scott Aurnou, Esq., CISSP discusses multi-factor authentication requirements under New York State’s Department of Financial Services’ Cybersecurity Regulation in this excerpt from the Lawline program The New DFS Cybersecurity Regulation: What Every Attorney Should Know. The full program is available here:
https://www.lawline.com/course/the-new-dfs-cybersecurity-regulation-what-every-attorney-should-know.
Posted in Laptops & Desktops, Network Security
How to Avoid Business E-Mail Compromise Scams
Scott Aurnou, Esq., CISSP discusses the danger posed by business e-mail compromise scams (and how to identify and avoid them) in this excerpt from the Lawline program Ethical Risks & the Human Element of Information Security: Insiders and Social Engineering. The full program is available here:
Posted in Fraud & Scams, Network Security
Third Party Risk and the NY DFS Cybersecurity Regulation
Scott Aurnou, Esq., CISSP discusses third party risk requirements under New York State’s Department of Financial Services’ Cybersecurity Regulation in this excerpt from the Lawline program The New DFS Cybersecurity Regulation: What Every Attorney Should Know. The full program is available here:
https://www.lawline.com/course/the-new-dfs-cybersecurity-regulation-what-every-attorney-should-know.
Posted in Cloud Security, Network Security