iOS app Android app

Brian E. Finch
GET UPDATES FROM Brian E. Finch
 
Brian Finch is a partner in the DC office of Pillsbury Winthrop Shaw Pittman LLP, and is the co-leader of the firm’s Global Security practice. He is also a professor at The George Washington University School of Law. Named by Washingtonian magazine in 2011 as one of the top 40 federal lobbyists under the age of 40, Mr. Finch is a recognized authority on global security matters. He counsels clients on regulatory and government affairs issues involving the Department of Homeland Security, Congress, the Department of Defense, and other federal agencies. Specifically, his focuses include liability mitigation, protection of critical infrastructure, state and local grant funds, WMD response preparations, chemical security, cyber security, and border and trade security. You can reach Brian at brian.finch@pillsburylaw.com.

Entries by Brian E. Finch

The Admiral Sets a Good Course

(1) Comments | Posted June 20, 2014 | 11:32 AM

Admiral Mike Rogers, the new leader of the National Security Agency and Cyber Command at the Defense Department, certainly has taken a different approach from his predecessor, General Keith Alexander. Right out of the gate, Admiral Rogers noted that the NSA had a public image issue and that it had...

Read Post

Allied Cyber Forces? Yes Please.

(0) Comments | Posted April 28, 2014 | 3:34 PM

Often lost in the debate over surveillance and the actions of the National Security Agency is that cyber space is a potential battlefield where countries will vie for superiority just as they do with air, sea, and land. So it should be no shock to anyone that Defense...

Read Post

A Welcome Review

(0) Comments | Posted April 22, 2014 | 11:28 AM

Eleven years into its existence, communication is still a fundamental challenge for the Department of Homeland Security (DHS). Sure, we see TSA screeners at airports every day, and there is a local FEMA office you can reach out to in the event of an emergency. However, for owners and operators...

Read Post

The Danger Signs Are Adding Up

(0) Comments | Posted April 8, 2014 | 5:52 PM

No one should be surprised that the world of cybersecurity and its associated blame game is continuing unabated. Several interesting incidents have happened in the past two weeks that bear highlighting:

  • Target recently saw its debt rating cut by Standard & Poor's. Part of the reason for the downgrade was...
Read Post

First Public NSA Speech: "De-Militarization" of Cyber Space

(1) Comments | Posted April 4, 2014 | 5:02 PM

Last week, in the first speech ever publicly delivered by the National Security Agency (NSA), Defense Secretary Chuck Hagel called for the "de-militarization" of cyber space. There certainly is precedent for such actions - military limits have previously been imposed on the Arctic Circle as well as outer space. And,...

Read Post

Here Comes the Cyber Chill?

(0) Comments | Posted March 27, 2014 | 4:39 PM

Disturbing news from the legal world this week, as cybersecurity vendor Trustwave was sued because it allegedly "failed to live up to its promises or to meet industry standards," according to an article in CIO Magazine.

While I am all in favor of holding parties responsible when they...

Read Post

End-of-Life Management

(0) Comments | Posted March 18, 2014 | 11:30 AM

If I told you that in the near future your organization's information technology infrastructure's operating system would be almost completely vulnerable to cyber attacks, you'd likely ask if I was taking advantage of some new laws in Colorado or Washington. Who in their right mind would let their systems be...

Read Post

Contracting Cybersecurity Efforts: Who Is Responsible?

(0) Comments | Posted March 12, 2014 | 2:16 PM

Siobhan Gorman penned an excellent article in Friday's The Wall Street Journal, discussing how alleged contracting omissions led to a successful cyber attack by Iranian hackers. According to her article, the Navy failed to "require it to provide specific security for a set of Navy Department databases, and...

Read Post

Cybersecurity Industry Interview With Marsh's Matt McCabe: Part Three

(0) Comments | Posted February 4, 2014 | 4:26 PM

As we kick off 2014, I am starting the New Year with an interview series, which will provide an overview of the cybersecurity industry. In the final part of this three part series, I spoke with Marsh's Senior Vice President of Network Security and Privacy Practice, Matt McCabe, discussing various...

Read Post

Cybersecurity Industry Interview With Xerox's Chuck Brooks

(0) Comments | Posted January 21, 2014 | 3:18 PM

I spoke with Vice President and Client Executive at Xerox, Chuck Brooks, discussing various components of the cybersecurity market. Xerox is a $22 billion corporation and is one of the largest holders of patents on the globe. In his role, Chuck often writes and speaks on evolving technologies, cybersecurity, public/private...

Read Post

Cybersecurity Industry Interview With Marsh's Matt McCabe: Part Two

(1) Comments | Posted January 10, 2014 | 4:21 PM

As we kick off 2014, I am starting the New Year with an interview series, which will provide an overview of the cybersecurity industry. I spoke with Marsh's Senior Vice President of Network Security and Privacy Practice, Matt McCabe, discussing various components of the cybersecurity market. At Marsh, Mr. McCabe...

Read Post

Cybersecurity Industry Interview With Marsh's Matt McCabe: Part One

(0) Comments | Posted January 8, 2014 | 9:22 AM

As we kick off 2014, I am starting the New Year with an interview series, which will provide an overview of the cybersecurity industry. In the first part of a three part series, I spoke with Marsh's Senior Vice President of Network Security and Privacy Practice, Matt McCabe, discussing various...

Read Post

Forget The Red Line, Worry About the Digital Line

(0) Comments | Posted September 26, 2013 | 12:20 PM

When Washington is up in arms over a "Red Line", it usually has something to do with the oft-delayed and perpetually overcrowded Metro line. Now of course, we are dealing with a completely different situation involving what was apparently an off-hand line from President Obama about what would force him...

Read Post

An Important "What If" of the NASDAQ Flash Freeze

(1) Comments | Posted August 30, 2013 | 1:52 PM

There was a collective holding of breath on Thursday when the NASDAQ suddenly shut down trading. Terse reports and statements that "technical problems" caused the halt raised the specter of an information technology meltdown or--worse yet--a deliberate, malicious event. Fortunately, as the day wore on trading resumed and at least,...

Read Post

White House Incentives to Support Cybersecurity: A Good Start for an As-Of-Yet Defined Goal

(0) Comments | Posted August 19, 2013 | 3:15 PM

Say what you will about President Obama's Administration, but one thing it can never be accused of is downplaying or ignoring the threat of cyber-attacks. The White House has made cybersecurity one of its top priorities, topping off its efforts with an Executive Order that set out to do many...

Read Post

Anything and Everything Can Be Hacked

(0) Comments | Posted August 15, 2013 | 6:58 PM

The 2013 Black Hat conference this past week proved once again that anything and everything can be hacked. Hackers showed how they could take remote command of televisions, home heating equipment, cars, and even -- of all things -- toilets. More than anything, the conference highlighted that many products these...

Read Post