Latest Posts › Cybersecurity

Share:

Defense Department Unveils Final Rule for CMMC 2.0 Program

The Time Is Now for Defense Contractors To Get Compliant. If you work for a defense contractor or subcontractor responsible for handling controlled unclassified information (CUI) and/or federal contract information...more

DOD’s CMMC 2.0 Program Takes Step Forward with Release of Contract Rule Proposal

The United States Department of Defense (DoD) took another big step on the path to instituting its highly anticipated Cybersecurity Maturity Model Certification 2.0 program (CMMC 2.0). Once finalized, CMMC 2.0 will establish...more

DoD Unveils Cybersecurity Strategy for Defense Industrial Base: What You Need to Know

The United States Department of Defense (“DoD”) recently published its Defense Industrial Base Cybersecurity Strategy 2024. For context, the DIB is comprised of more than 100,000 domestic and foreign companies or...more

Proposed Federal Cyber Incident Reporting Rule Adds Hefty Federal Reporting Requirements to Critical Infrastructure Sector and...

The federal Cybersecurity and Infrastructure Security Agency (CISA) released a draft of its proposed rule detailing how covered entities operating in critical infrastructure sectors report cyberattacks and ransomware payments...more

Defense Department’s Proposed CMMC Rule Will Impose New Cybersecurity Requirements on Contractors

The U.S. Department of Defense (DoD) released a proposed rule to implement its Cybersecurity Maturity Model Certification (CMMC) program, which would establish a comprehensive set of cybersecurity requirements applicable to...more

CPPA’s Regulatory Enforcement Restored: It’s Time to Get Compliant

For businesses subject to California Consumer Privacy Act (CCPA), privacy compliance just became urgent. A California appellate court agreed on February 9, 2024, with the California Privacy Protection Agency (CPPA) that there...more

What You Need To Know About CISA’s Cybersecurity Guidance for the Water & Wastewater Sector

CISA’s Incident Response Guide outlines ways in which WWS owners and operators can engage with federal agencies to prepare for, mitigate, and respond to cyber incidents, including best practices for incident response and...more

Examining Materiality and Cybersecurity Incidents: Practical Tips for Implementing the New SEC Rules

Publicly traded companies have tangled with the question of when a cybersecurity incident should be disclosed to the public and investors. In a bid to add clarity to the topic, the U.S. Securities and Exchange Commission...more

Biometric Privacy Trial Is a Milestone in Privacy Law

Generally, biometric privacy laws seek to protect the unique attributes of human beings that could be leveraged to access sensitive information about them, such as fingerprints and the measurements utilized for facial...more

A New Day for Data Privacy: California Privacy Act Exemptions Will Expire

January 1, 2023, is now a more ominous deadline in the data privacy compliance world. Privacy professionals have been watching California’s 2022 legislative session to see whether California Consumer Privacy Act (CCPA)...more

Proposed SEC Cybersecurity Rules Require Public Companies to Act Now

This month, the Securities and Exchange Commission (SEC) proposed new cybersecurity disclosure rules for publicly traded companies. The comment period is ongoing, but the take-away for public companies is immediate: a public...more

New Notification Requirements for Critical Infrastructure

President Joe Biden recently signed into law the Cyber Incident Reporting For Critical Infrastructure Act of 2022. This new law updates the Federal Information Security Modernization Act (FISMA)...more

Questions About Tort and Contract Claims in the Cybersecurity Context Left Unsettled

Supreme Court of Virginia Declines Certified Questions from Federal Court in In re: Capital One Consumer Data Security Breach Litigation - The lawsuit In re: Capital One Consumer Data Security Breach Litigation, has already...more

Before the Breach: Time to Get Serious About Cyber Resilience

Even as the world slowed in 2020, threat actors picked up their pace and used work-from-home infrastructure to spread malicious attacks. These bad actors also exploited trusted software vendors from Solar Winds to Microsoft,...more

Governor Signs Virginia Consumer Data Protection Act

Elizabeth Burgin Waller Principal John Pilch Cybersecurity/Privacy Analyst The Virginia Consumer Data Protection Act (CDPA, or “the Act”) makes Virginia the second state in the nation to have sweeping data privacy...more

Virginia Is Likely Second State to Pass a Major Data Privacy Act

Rarely do Virginia and California fall into the same camp on legislation, but that may change with Virginia’s Consumer Data Privacy Act (the “Act”). The Virginia House of Delegates overwhelmingly passed the Act on January...more

16 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide