Main Menu

Cybersecurity Disclosure Requirements for Public Companies: Are You Prepared to Comply With The New Rules?

February 1, 2024

Join MSK partner, Andrea Cataneo, a 25 year veteran corporate and securities attorney and cybersecurity expert and CEO of SideChannel, Inc. (OTCQB:SDCH), Brian Haugli, for a Fireside Chat, titled, "Cybersecurity Disclosure Requirements for Public Companies - Are You Prepared to Comply With the New Rules?"

Get the insights and tools you need-  and know how to access the experts if you need them. See why thousands of people have already been paying attention to what this duo has to say.

To view more details and register, click here

Andrea Cataneo is a partner in MSK's Corporate & Business Transactions Practice Group in the firm's New York office, and a member of the Capital Markets & Securities and Crypto Assets & Blockchain Technology teams as well.

Andrea’s practice focuses on preparing companies for capital raises, structuring secured and unsecured equity and debt financing transactions for early and late stage companies, and taking private companies public via self-registration statements and IPOs. Additionally, through her extensive relationships in the investment banking community, Andrea offers her clients introductions to targeted sources of capital.

Brian Haugli has been driving security programs for two decades and brings a true practitioner’s approach to the industry. He creates a more realistic way to address information security and data protection issues for organizations. He has led programs for the DoD, Pentagon, Intelligence Community, Fortune 500, and many others. Brian is a renowned speaker and expert on NIST guidance, threat intelligence implementations, and strategic organizational initiatives.

Brian is the contributing author for the latest book from Wiley, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework“.

Lastly, he is a professor at Boston College, in the Woods College of Advancing Studies, Master’s Program in Cybersecurity.


Back to Page