Don't miss this important annual employment law update! Please join us for this complimentary seminar on cutting-edge employment law issues. The 2018 employment landscape is significantly different and this seminar will...more
It was recently revealed that the Securities and Exchange Commission’s (“SEC”) EDGAR database, which is used by public companies to file official documents, was breached. According to the SEC, trading off of that hacked...more
10/10/2017
/ Cyber Attacks ,
Cybersecurity ,
Data Breach ,
EDGAR ,
Filing Requirements ,
Financial Markets ,
Hackers ,
Insider Trading ,
Popular ,
Registration Statement ,
Securities and Exchange Commission (SEC)
Join Nossaman attorneys for a webinar to discuss evolving cybersecurity threats facing water utilities. Cybersecurity is one of the top threats faced by all businesses in the United States, but water utilities sit in a...more
Nossaman LLP and University of California, Irvine School of Law invite you to join us for "Cybersecurity, Data Breach, and Privacy: A Real World Perspective on Prevention, Response and the Future." This complimentary...more
A few weeks back, the Insurance Recovery report posted a blog about the difficulty obtaining insurance coverage for “fake president” fraud, which is also known as business e-mail compromise, or social engineering fraud. Two...more
8/3/2017
/ Computer Fraud Insurance ,
Corporate Counsel ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Denial of Insurance Coverage ,
Email ,
Insurance Industry ,
Phishing Scams ,
Policy Terms ,
Social Engineering ,
Wire Fraud
In the last few weeks, we have seen yet another widespread ransomware attack that hit nearly one hundred companies around the world. It reminded me of a recent request from a client, made just after news broke of the...more
7/11/2017
/ Corporate Counsel ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Email ,
Hackers ,
Information Technology ,
Insurance Industry ,
Policy Terms ,
Popular
With the confirmation of Jay Clayton as the Chair of the Securities and Exchange Commission, comments made last month by the Acting Enforcement Director, Stephanie Avakian, regarding the importance of accurate reporting in...more
On October 25, the Privacy Law Report featured a blog post on new cybersecurity regulations being implemented by the New York Department of Financial Services (“DFS”). Those regulations impose a number of requirements on...more
Recently, members of the House Energy and Commerce Committee told Congress that they must set cyber security standards for all devices connected to the internet or else face the possibility of a major cyberattack that could...more
A report issued last week by Beazley, one of the prominent insurance companies in the cyber field, revealed what industry experts predicted earlier in the year – ransomware is an increasingly prevalent menace. That report is...more
It was recently revealed that the Hollywood Presbyterian Medical Center paid $17,000 in bitcoins as ransom to hackers who infiltrated and disabled its computer network. This is not the first time hackers have held up a...more
On October 12, Nossaman and UC Irvine hosted their first annual cyber symposium at the Los Angeles City Club. The event brought experts together to discuss a variety of critical issues in the worlds of privacy and data...more
10/26/2015
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Insurance ,
Cyber Threats ,
Cyberforensics ,
Cybersecurity ,
Data Breach ,
Data Security ,
Google ,
Hackers ,
KPMG ,
Popular ,
Privacy Policy ,
Sony
Nossaman LLP and University of California, Irvine School of Law invite you to join us for this complimentary half-day seminar on recent developments in the areas of cybersecurity, data breach, privacy, and their implications...more
If you think you are being overly paranoid about the recent cyber attacks on Sony, JP Morgan, and Target, think again. You aren’t the only one that has been paying attention – hackers are also front-and-center on the minds...more
Your network is your company’s life blood. You want to be protected in the event your cybersecurity is breached; the attack on Target being a recent, well-publicized reminder to the threat of cyber attacks. ...more