News & Analysis as of

Cybersecurity Best Practices

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Fox Rothschild LLP

Best Practices for Securing Data Used to Train and Operate AI Systems

Fox Rothschild LLP on

The National Security Agency’s Artificial Intelligence, Security Center (AISC), together with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals...more

American Conference Institute (ACI)

[Virtual Conference] 19th Annual BIG FOUR Pharmaceutical Pricing Boot Camp - June 23rd - 24th, 9:00 am - 5:30 pm EDT

Attend ACI's 19th Annual BIG FOUR Pharmaceutical Pricing Boot Camp for an intensive online bootcamp that will provide you with a thorough understanding of essential government contracting processes and pricing concepts for...more

Alston & Bird

UK Publishes Software Security Code

Alston & Bird on

Cyber security supply chain risks are growing, and attacks on vendors and other third parties cause severe disruption to businesses. For example, in recent years we have seen many incidents that have involved threat actors...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

Ankura

Zero Trust Architecture Best Practices

Ankura on

As cyber threats become increasingly sophisticated, traditional security models that rely on perimeter defenses are no longer sufficient. Zero Trust Architecture (ZTA) offers a modern approach to security that assumes no user...more

Fisher Phillips

2025 Summer Reading List for Educational Leaders

Fisher Phillips on

Another school year is winding down, and educational leaders perhaps have never been more ready for summer break. From the Trump administration’s significant policy shifts to deeply consequential litigation playing out to...more

Kaufman & Canoles

[Event] 41st Annual Employment Law Update - May 15th, Hampton, VA

Kaufman & Canoles on

Managing risk in the employment law circus isn’t always easy when the rules change like they are contortionists. The 41st Annual Employment Law Update will highlight recent changes to the law and how employers can most...more

Hogan Lovells

NIST finalizes cybersecurity incident response framework profile aligned with CSF 2.0

Hogan Lovells on

On April 3, NIST published practical incident response guidance aligned with its CSF 2.0 framework. The guidance outlines best practices in security incident preparation and response for organizations mapped across each of...more

StoneTurn

2025 Incident Response Landscape: Practical Tips for Cybersecurity Readiness

StoneTurn on

Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more

Frost Brown Todd

Managing Data Security and Privacy Risks in Enterprise AI

Frost Brown Todd on

Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy and security risks. And...more

American Conference Institute (ACI)

[Event] 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls - March 26th - 27th, San Francisco, CA

As global trade policy evolves faster than ever, now is the time to connect with your peers, discover new strategies, and most importantly, hear from the regulatory agencies on the front lines of policy change. ACI’s 15th...more

Katten Muchin Rosenman LLP

FINRA Publishes 2025 Annual Regulatory Oversight Report - A Window Into Best Practices and FINRA's Focus in a New Regulatory...

On January 28, the Financial Industry Regulatory Authority (FINRA) published the 2025 update to its annual Regulatory Oversight Report.1 The report collects recent observations and findings from FINRA's oversight programs –...more

U.S. Legal Support

Best Practices to Secure Law Firm Documents

U.S. Legal Support on

Law firms handle confidential information and documents that require diligent protection. The stakes are high, the regulations and their sources are vast, and technology is sophisticated and ever-changing....more

Society of Corporate Compliance and Ethics...

[Virtual Event] Government Contracting Compliance & Ethics Conference - February 27th, 8:00 am - 5:00 pm CT

Stay on top of the complexities of government contracting - Few industries are as heavily regulated or complex as government contracting. If your organization performs government-contracted services, or if you are charged...more

Blake, Cassels & Graydon LLP

Décodage des défis de cybersécurité : Perspectives et pratiques exemplaires

Les cybermenaces se multiplient et évoluent sans cesse, ce qui oblige les organisations à maintenir leur résilience opérationnelle et à protéger leurs actifs clés, comme leurs infrastructures critiques et leurs données...more

Womble Bond Dickinson

Defending Data Breach Class Actions

Womble Bond Dickinson on

Class actions arising from data breach represented the fastest growing segment of class action filings. In 2023, more than 2000 class actions were filed, more than triple the amount filed in 2022. These cases were filed in...more

Blake, Cassels & Graydon LLP

Cybersecurity Challenges Decoded: Insights and Best Practices

Cybersecurity threats continue to grow and evolve, increasing pressure on organizations to maintain operational resilience and protect their key assets, such as critical infrastructure and sensitive data. As cyberattacks...more

Royer Cooper Cohen Braunfeld LLC

How the Election Shapes Your Compliance Program

Staying the course in compliance is crucial, especially during uncertain political times. Regulatory updates like the new AML rule and Cybersecurity can have a significant impact on your program, and it's important for...more

King & Spalding

NIST Publishes Internet of Things Advisory Board Report

King & Spalding on

In 2021, Congress created the Internet of Things Advisory Board (IoTAB) within the Department of Commerce and charged it with providing advice to the Internet of Things Federal Working Group, a collaboration of Federal...more

Seyfarth Shaw LLP

The Department of Labor’s Expanded Cybersecurity Guidance: What ERISA Plan Sponsors and Fiduciaries Need to Know

Seyfarth Shaw LLP on

On September 6, 2024, the U.S. Department of Labor (DOL) issued Compliance Assistance Release No. 2024-01, titled “Cybersecurity Guidance Update.” The updated guidance clarifies that the DOL cybersecurity guidance applies to...more

Baker Donelson

Ten Best Practices to Protect Your Organization Against Cyber Threats

Baker Donelson on

The conclusion of Cybersecurity Awareness Month is a reminder of the importance for organizations to implement robust security measures and promote good cyber hygiene. As we noted in our State of the Cyber Landscape webinar,...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Human Resources’ Role in Data Privacy and Cybersecurity, Part IV: Communicating Effectively With Employees After a Data Breach

In today’s data-driven environment, effective communication during a cybersecurity breach is crucial for maintaining employee trust and confidence. This fourth article in our five-part series on employee data privacy focuses...more

Wiley Rein LLP

[Webinar] Best Practices in Cyber Preparedness - October 23rd, 12:00 pm - 1:00 pm EDT

Wiley Rein LLP on

We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more

Ogletree, Deakins, Nash, Smoak & Stewart,...

Human Resources’ Role in Data Privacy and Cybersecurity, Part I: The Basics

Welcome to our five-part series on human resources’ (HR) role in managing employee data privacy with grace, agility, and expertise. In this five-part series, each article will build on previous installments to help HR...more

Health Care Compliance Association (HCCA)

[Event] Regional Healthcare Compliance Conference - October 25th, Louisville, KY

Looking for compliance education and networking in your area? HCCA’s Regional Healthcare Compliance Conferences offer practitioners convenient, local compliance education on a wide variety of current and emerging topics...more

395 Results
 / 
View per page
Page: of 16

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide