Breach to Bench: How Class Actions Are Born From Cyber Incidents with Chris Wood

Season 2 /
/Episode 36

Breach to Bench: How Class Actions Are Born From Cyber Incidents with Chris Wood

In this episode of the Safe House Initiative, host Jeff Edwards and Tawana Johnson speak with Chris Wood, a partner at Lewis Brisbois law firm, on the complexities of data breach litigation. 

He reveals that class action lawsuits have surged sixfold and are now targeting small and midsize businesses, not just large corporations. The litigation process often begins with regulatory breach disclosures, with plaintiffs’ attorneys focusing on claims of negligence and breach of contract.

Wood emphasizes that businesses can mitigate risk by implementing strong cybersecurity policies, conducting penetration tests, and adhering to standards like NIST and ISO. He also stresses that cyber insurance is essential for covering the high costs of legal defense and settlements.

#DataBreach #Cybersecurity #CyberLiability #LegalRisk #ClassAction #SMBs #CyberInsurance #NIST #Compliance #LewisBrisbois

Protecting Rural America from Cyber Threats: Inside the PISCES Mission with Mike Hamilton

What happens when rural hospitals, public utilities, schools, and small governments become targets of cyberattacks but lack the resources to defend themselves?

In this episode of The SafeHouse Podcast, Jeff Edwards welcomes Mike Hamilton, former Seattle CISO and CTO of PISCES International, a nonprofit organization delivering free cybersecurity monitoring and real-world workforce training to underserved communities across the United States.

This conversation is based on a real-world, three-part series designed for everyday people who suddenly find themselves dealing with a hacked account, fraud, or a suspicious alert.

Read More »

What to Do If You Get Hacked: A Practical Survival Guide with Alan Gin

In this SafeHouse episode, Jeff Edwards and Alan Gin break down what actually happens when a cyber incident hits and what you should do next.

This conversation is based on a real-world, three-part series designed for everyday people who suddenly find themselves dealing with a hacked account, fraud, or a suspicious alert.

If you’ve ever wondered what you would actually do in that moment, this episode walks you through it step by step.

Read More »

Cyber Risk: Where Mitigation Meets Insurance With Michael Phillips

Cyber risk management is often framed as a choice between prevention and insurance. In reality, the most resilient organizations combine both.
In this episode of The SafeHouse, Jeff Edwards speaks with Michael Phillips, Global Head of Cyber at Coalition, about how insurers evaluate cyber risk and why mitigation and insurance must work together.

Building on a previous discussion about the elements of risk management, the conversation explores how underwriters think about cyber exposure, what signals insurers look for when assessing organizations, and why operational resilience is becoming central to modern cyber insurance.

The result is a practical discussion about how businesses should approach cyber risk today.

Read More »

Making Sense of Risk Management with Davis Hake

Cyber risk management is often discussed in technical language. But at its core, risk is financial.

In this episode of The SafeHouse Podcast, Jeff Edwards interviews Davis Hake of Venable to break down how cyber risk should be measured, communicated, and quantified inside organizations.

For CISOs, risk managers, brokers, underwriters, and resilience professionals, this episode provides a practical framework for thinking about cyber exposure beyond compliance checklists.

If you want to understand cyber risk in terms that boards and CFOs actually respond to, this conversation is essential listening.

Read More »

When Cybersecurity Became a State Responsibility with James Saunders

Federal cybersecurity responsibility has shifted to the states. What happens next?

In this episode of The SafeHouse Podcast, Jeff Edwards welcomes James Saunders, Chief Information Security Officer for the State of Maryland, for a deep conversation on state-level cybersecurity, resilience, and leadership.

James walks through his path from early technical support roles to federal cybersecurity leadership and now to protecting Maryland’s digital ecosystem. He explains Maryland’s IT Master Plan, the state’s five-pillar cybersecurity strategy, and how partnerships, talent, and resilience come together in practice.

This episode offers a behind-the-scenes look at how cybersecurity decisions are made at scale, how states collaborate with one another, and why taking care of people matters as much as taking care of systems.

Read More »