“If anything kills over 10 million people in the next few decades, it’s most likely to be a highly infectious virus, rather than a war. Not missiles, but microbes.” That’s from Bill Gates’ 2015 TED Talk, in the midst of the Western African Ebola outbreak. Gates added “W]e’re not ready for the next epidemic…. With Ebola, the problem was not that we had a system that didn’t work well enough. The problem was that we didn’t have a system at all.”
Let’s fast-forward to a couple years ago, the 100th anniversary of the 1918 flu pandemic. What should have been understood in 2018 as the risk, in the near-term, of an epidemic or pandemic with major impact in the United States?
Understanding risk is how we address uncertainty. Whether you prefer the common definition of risk (the possibility of loss or injury) or the more technical concept under ISO 31000 or COSO’s ERM Integrated Framework (the effect of uncertainty on objectives), understanding risk requires us to evaluate the likelihood and severity of potential outcomes. Understanding risk also requires us to evaluate our current readiness to mitigate or control the risk, in light of our risk tolerance.
So, in 2018, what did we know about the likelihood and potential severity in the United States of epidemics and pandemics, and what did we know about our readiness to respond?
Continue Reading Pandemic Lesson 1 for Information Governance: Understanding risk matters

It’s been a challenging 2020, as each of us adapts to our new pandemic reality. In the United States as of today,
Having too much data causes problems beyond needless storage costs, workplace inefficiencies, and uncontrolled litigation expenses. Keeping data without a legal or business reason also exacerbates data security exposures. To put it bluntly, businesses that tolerate troves of unnecessary data are playing cybersecurity roulette … with even larger caliber ammunition.
Most people have elevated stress during the holiday season — work, travel, family, money, time. And holiday stress can make people inattentive, tired, frustrated, and willing to take short cuts, especially when it comes to computer and Internet use. This is when mistakes happen. It’s when we decide to evade policy by emailing work home or by using the unsecured airport Wi-Fi because our plane is delayed. It’s also when malicious acts of information theft, sabotage, and fraud can more easily occur and go undetected.
Testing for technical vulnerabilities is a key part of security risk assessment. To get the straight scoop on technical vulnerabilities, and how they’re exploited, why not ask a hacker?
Would you take a deposition by solely following a template of standard questions, without assessing the unique issues and circumstances of the case? Or conduct transaction due diligence by simply marching though a generic punch list, without assessing the unique aspects of the company, the deal, and the industry? Of course not. Your law firm’s data security posture is no different – you need a security risk assessment to understand your firm’s unique vulnerabilities to security threats, and to identify which security controls are already adequate for your firm and which other safeguards are needed.
I had a nagging worry that something was wrong with my car, so I finally decided to take it to the dealer. I couldn’t exactly describe my concern, except there was an intermittent, “funny noise” coming from somewhere in the front end. An unscrupulous dealer would have taken me down a long path of parts replacement, beginning with tires, then wheels, then tie rods, and on and on, perhaps never fixing the real problem. Fortunately, my dealer was honest and performed diagnostics, ultimately discovering that the rack and pinion was failing. The part was under warranty, so the repair cost me nothing and my funny noise is gone.
It’s a common complaint – most U.S. laws requiring data security never cough up the specifics of what must be done to comply. Unlike other areas of business regulation, data security requirements seem hopelessly vague: