News & Analysis as of

Cloud Computing Best Practices Cybersecurity

Hogan Lovells

ECB Guide on outsourcing cloud services to cloud service providers

Hogan Lovells on

The European Central Bank (ECB) has published its Guide on outsourcing cloud services to cloud service providers (the "Guide") clarifying how banks are expected to comply with obligations under the EU Digital Operational...more

American Conference Institute (ACI)

[Event] 14th Advanced Forum on Global Encryption, Cloud & Export Controls - May 15th - 16th, San Francisco, CA

Hosted by American Conference Institute, the 14th Advanced Forum on Global Encryption, Cloud & Cyber Export Controls returns for another exciting year with curated programming that brings together a global gathering of...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

The Volkov Law Group

Living in the Cloud: Practical Approaches to Cybersecurity Risks (Part III of III)

The Volkov Law Group on

Businesses are increasingly relying on the cloud to store confidential and sensitive information.  One-third of information technology budgets are used for cloud services.  Rapid growth in cloud storage is expected over the...more

Orrick, Herrington & Sutcliffe LLP

A Cloud on the Horizon: Trade Secret Theft in the Cloud

As cloud services have transformed modern business, they have also changed the way companies protect and enforce their trade secrets. Companies and their employees increasingly store data on cloud - based platforms. While...more

Foley & Lardner LLP

Cybersecurity Update - July 2015

Foley & Lardner LLP on

Employees are the front line of your information security defense. While technological protections are essential (for example, anti- virus software, firewalls, spam filters, etc.), none are as effective as a vigilant end...more

BakerHostetler

To Err Is Human; to Indemnify, Divine?: Human Foibles in the Cloud

BakerHostetler on

BakerHostetler’s inaugural Data Security Incident Response Report (the “Report”) concluded that employee negligence and theft were two of the top five causes of data security incidents for the more than 200 incidents that we...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide