News & Analysis as of

Cyber Insurance Risk Mitigation

Woodruff Sawyer

[Ongoing Program] Risk Management for Your Life Sciences Company: Webinar 3 - International Clinical Trials Country Requirements-...

Woodruff Sawyer on

From lab to commercialization: Navigate the evolving risks of life science companies - Life science companies face rapidly evolving risks—from navigating insurance needs during early funding stages to understanding...more

Woodruff Sawyer

[Ongoing Program] Risk Management for Your Life Sciences Company: Webinar 2 - AI In Real Life (Science): Exploring Real World...

Woodruff Sawyer on

From lab to commercialization: Navigate the evolving risks of life science companies - Life science companies face rapidly evolving risks—from navigating insurance needs during early funding stages to understanding...more

Woodruff Sawyer

[Ongoing Program] Risk Management for Your Life Sciences Company: Webinar 1 - Navigating Risk from Lab to IPO: A Guide to...

Woodruff Sawyer on

From lab to commercialization: Navigate the evolving risks of life science companies - Life science companies face rapidly evolving risks—from navigating insurance needs during early funding stages to understanding...more

Integreon

How AI is Reshaping Cyber Insurance

Integreon on

AI emerges as both threat and solution in cyber insurance, reshaping risk assessment and breach response. AI is transforming the work of professionals everywhere. Unfortunately, that includes cybercriminals....more

Womble Bond Dickinson

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

Womble Bond Dickinson on

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Esquire Deposition Solutions, LLC

Actionable Advice When Sharing Client Data with Vendors

We’ve previously written on the need for law firms to scrutinize the data security protections in place at all third-party vendors who have access to client confidential information. Clearly, that’s still good advice....more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 2nd, Charlotte, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 1st, Raleigh, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - October 30th, Washington, DC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

BakerHostetler

DSIR Deeper Dive: 2023 Crypto Threat Landscape

BakerHostetler on

Following one of the most turbulent years in crypto history, 2023, in contrast, unfolded as a year of reprieve, including from crypto threats. According to a July 12, 2023, report from blockchain analytics firm Chainalysis,...more

Lowenstein Sandler LLP

Call Me, Maybe? The Stealth Disappearance of Social Engineering and Fraudulent Instruction Coverage

Lowenstein Sandler LLP on

Today on Don’t Take No for an Answer, Lynda A. Bennett and Eric Jesse discuss the stealth disappearance of social engineering and fraudulent instruction coverage, and what you can do to make sure you have insurance coverage...more

Ervin Cohen & Jessup LLP

Insure Against Data Breaches Suffered By Vendors and Service Providers

Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more

Clark Hill PLC

[Webinar] Insurance Considerations for Deploying AI/ML Tools and Technologies - July 12th, 9:00 am PT

Clark Hill PLC on

The use of Artificial Intelligence and Machine Learning technologies can improve operational efficiencies and enhance business innovation. But AI/ML tools also present certain use-case-specific risks, such as copyright and IP...more

Dorsey & Whitney LLP

Recent Trends in Wire Fraud Scams: Uncovering and Tackling the Latest Tactics in Hong Kong

Dorsey & Whitney LLP on

Wire fraud threats have been on the rise in recent years, with Hong Kong becoming a particularly attractive destination for fraudsters due to its status as a global financial hub. Criminals are using increasingly...more

Partridge Snow & Hahn LLP

Non-Profit Organizations Can Reduce Risks by Addressing Data Privacy Concerns in Advance

With the threat of cyber-attacks making the news, it is a good time for all non-profit organizations to review their policies and procedures with respect to data privacy. Many non-profit organizations are particularly...more

Woodruff Sawyer

Scams and Viruses: Which Email Attachments Are Safe to Open?

Woodruff Sawyer on

Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more

Lowenstein Sandler LLP

How Patching log4J Can Mitigate Regulatory and Insurance Issues

Lowenstein Sandler LLP on

A major software vulnerability (known as Log4j or Logshell) continues to have a major impact on many industries, causing insurance carriers and regulators to take notice. In the latest episode of Lowenstein Sandler’s...more

Lowenstein Sandler LLP

Takeaways From Recent Claims Against Mark Zuckerberg and Facebook – Mitigating the Heightened Risk of Privacy Suits Against...

Lowenstein Sandler LLP on

As recent claims against Facebook CEO Mark Zuckerberg in relation to the Cambridge Analytica data-mining scandal continue to develop, Lynda, joined by Lowenstein attorneys Kathleen McGee, Partner in the firm’s White Collar...more

Health Care Compliance Association (HCCA)

Compliance Refresher: Get Cozy With IT Folks, Review Insurance, Fine-Tune Policies, Training

Report on Patient Privacy 21, no. 11 (November, 2021) - Attorney Brad Hammer doesn’t always don a suit and tie, or what he calls his “lawyer’s uniform.” A privacy and security expert and founder of the Vakaris Group based...more

Womble Bond Dickinson

Hacking Is Changing: Should Our Data Security Change?

Womble Bond Dickinson on

In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more

Farella Braun + Martel LLP

How to Guard Against 3 Cannabis Cyber Attack Risks

Cyber attacks are now commonplace. Ransomware attacks, in particular, have skyrocketed in frequency and size. High-profile data breaches have cost businesses in the United States millions of dollars in losses and incalculable...more

Lowndes

Avoiding Ransomware Attacks is Not a Pipe Dream: Actionable Steps to Avoid Becoming the Next Victim

Lowndes on

Recently, the largest gasoline pipeline in the United States fell victim to a ransomware attack that caused the pipeline to go offline for several days. In addition to causing gas shortages across the Southeastern United...more

McDermott Will & Emery

Top Takeaways - Cybersecurity & Insurance Coverage in the Age of Telehealth: Understanding and Mitigating Your Risk

McDermott Will & Emery on

With more frequent and more severe ransomware attacks against health care platforms and vendors and the increasing use of telemedicine, it is critical to understand how to proactively defend your organization using robust...more

Woods Rogers

Before the Breach: Time to Get Serious About Cyber Resilience

Woods Rogers on

Even as the world slowed in 2020, threat actors picked up their pace and used work-from-home infrastructure to spread malicious attacks. These bad actors also exploited trusted software vendors from Solar Winds to Microsoft,...more

61 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide