News & Analysis as of

Cybersecurity Data Protection Data Loss Prevention

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Lighthouse

Data Loss Prevention in the Age of AI: A New Landscape Demands New Approaches

Lighthouse on

Learn how to enhance your approach to data loss prevention with AI in mind, including what capabilities are essential for your organization and how to deploy Microsoft Purview DLP to address your needs. The information...more

HaystackID

[Webcast Transcript] Anatomy of a Business Email Compromise

HaystackID on

Editor’s Note: This webcast brings together some of HaystackID’s top experts to dissect the intricacies of Business Email Compromise (BEC) attacks—a rapidly growing threat impacting organizations globally. During the...more

Troutman Pepper Locke

Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast

Troutman Pepper Locke on

Unauthorized Access, Troutman Pepper's privacy and cybersecurity-focused podcast, spotlights the human aspect of the cybersecurity industry, introducing you to the remarkable personalities that make the industry amazing....more

Woodruff Sawyer

Preventing Data Leakage

Woodruff Sawyer on

Data leakage, also known as data exfiltration or data spillage, refers to the unauthorized transfer of sensitive data from an organization’s internal network to an external location. This can occur through various means, such...more

EDRM - Electronic Discovery Reference Model

[Webinar] Managing Data Related Procedures Inside Corporate! - September 27th, 1:00 pm - 2:15 pm ET

Join us in a unique discussion regarding the cross-functional activities eDiscovery, IT, Compliance, Data Governance, and Security leaders often participate in while managing a large corporation’s information. Tips and tricks...more

Ankura

Implementing the NIST Privacy Framework – Protect Function

Ankura on

This is the final installment in a series of articles on the core functions of the National Institute of Standards and Technology (NIST) Privacy Framework where we cover the Protect function. As previously published in an...more

McDermott Will & Emery

NIST Issues Cybersecurity Framework for Ransomware Risk Management

McDermott Will & Emery on

The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) recently issued a Ransomware Profile identifying steps organizations can take to prevent, respond to and recover from...more

NAVEX

The State of Risk Alignment - Alliances Grow Between IT Security and IRM

NAVEX on

While business risks abound, including intensified cybersecurity attacks, the impact of rapid technological advances and increasing regulations, there are healthy ways to uncover and mitigate risks. Organizations are...more

Carlton Fields

No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day

Carlton Fields on

The No Password Required Podcast is dedicated to introducing and celebrating the practitioners, leaders, researchers, and individuals who are shaping the cybersecurity industry. Join us for an in-depth conversation that...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - March 2020

Robinson & Cole LLP on

Two Las Vegas casinos’ networks were down over the past week, with posted signs saying “Cash Only” throughout the casinos after a suspected ransomware attack. Electronic slot machines were silent as the casinos reacted to the...more

Carlton Fields

Ransomware Attack Replacement Costs Are Covered “Direct Physical Loss or Damage” Under Standard Business Owner’s Policy, According...

Carlton Fields on

A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more

Herbert Smith Freehills Kramer

Cybersecurity: the SEC Provides Guidance on Well-Known and Emerging Best Practices

At the end of January, the U.S. Securities and Exchange’s Office of Compliance Inspections and Examinations (OCIE) released its “Observations on Cybersecurity and Resiliency Practices” (Observations)....more

Baker Donelson

SEC Dispatches on Cybersecurity

Baker Donelson on

2020 OCIE Priorities - On January 7, 2020, the Securities Exchange Commission's (SEC) Office of Compliance Inspections and Examination (OCIE) released its "2020 Examination Priorities," which included a focus on...more

Alston & Bird

SEC Releases Detailed Set of “Cybersecurity and Resiliency Observations”

Alston & Bird on

On January 28, 2020, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) released a detailed set of observations culled from thousands of examinations of registered investment advisers, broker-dealers,...more

Proskauer Rose LLP

OCIE Publishes Cybersecurity and Resiliency Observations

Proskauer Rose LLP on

Background - On January 27, 2020, the U.S. Securities and Exchange Commission's Office of Compliance Inspections and Examinations ("OCIE") published its Cybersecurity and Resiliency Observations. Cybersecurity and data...more

Hogan Lovells

SEC Releases Cybersecurity and Resiliency Observations: A Potentially Useful Guide for Businesses

Hogan Lovells on

In today’s connected world, businesses face constant pressure to improve their cybersecurity practices and to confirm that they are meeting industry standards. To continue helping businesses achieve those goals, the SEC...more

Bracewell LLP

SEC Examiners Release Cyber Observations: What You Need To Know

Bracewell LLP on

On January 27, 2020, the SEC’s Office of Compliance Inspections and Examinations (OCIE) announced its most recent Cybersecurity and Resiliency Observations. This report highlights specific practices that have been, and can be...more

Morgan Lewis

SEC Publishes Report on Cybersecurity and Resiliency

Morgan Lewis on

The US Securities and Exchange Commission (SEC) Office of Compliance Inspections and Examinations (OCIE) published a report on January 27 outlining various industry practices and approaches to managing and combating...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Municipalities vs. Ransomware Attacks - Who's Winning?

Ransomware attacks on municipalities were on the rise in 2019, with two-thirds of known ransomware attacks in the United States targeting governments, and the trend is expected to continue for 2020. It is important for...more

Bass, Berry & Sims PLC

Privacy Perils: The Expensive New Threat

By now, you’ve heard a horror story or two about ransomware. The city of Baltimore’s tale stands out. After cyber-criminals attacked the city’s servers and applications, they demanded $76,000 to decrypt the affected files....more

Carlton Fields

CF on Cyber: Leveraging the Incident Response Guide to Prepare for the CCPA

Carlton Fields on

In this program, Jack Clabby, Joe Swanson and Steve Blickensderfer give practical advice on the attorneys’ role in a data security incident response guide, which is a key document in preparing for California’s new data...more

The Volkov Law Group

Managing Third-Party Vendor Cybersecurity Risks (Part II of III)

The Volkov Law Group on

We all know that businesses rely on a large number of third-party vendors to support their business operations.  Many of these third parties require access to a company’s data and its internal information and technology...more

Roetzel & Andress

HHS Releases Guidance For Health Industry On Voluntary Cybersecurity Practices

Roetzel & Andress on

The Department of Health and Human Services (HHS) has released a publication entitled the "Health Industry Cybersecurity Practices (HICP): Managing Threats and Protecting Patients." The HICP was prepared in response to the...more

Holland & Knight LLP

Impact of the New Health Industry Cybersecurity Practices: 2019 Outlook

Holland & Knight LLP on

• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more

Verrill

Is Cybersecurity on Your 2019 Work Plan?

Verrill on

On December 28, 2018, the U.S. Department of Health and Human Services (“HHS”) closed out the year by releasing long-awaited voluntary cybersecurity guidelines for the health care industry. The four-volume publication,...more

34 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide