News & Analysis as of

Cybersecurity European Commission Supply Chain

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Pillsbury Winthrop Shaw Pittman LLP

Navigating the EU’s “NIS 2” Directive: Key Cybersecurity Compliance Points for Businesses Operating in the EU to Consider

The NIS 2 Directive requires a wide range of in-scope organizations to adopt robust cybersecurity measures and incident response plans....more

Mayer Brown

EU Cyber Legislation Puts Emphasis on Board Responsibility

Mayer Brown on

What is a Management Body? Under both DORA and NIS2, a management body can be a body with managerial and/or supervisory functions. The powers and structure of management bodies vary within the EU Member State, and managerial...more

McDermott Will & Emery

[Event] 2024 McDermott International Seminar in Japan - January 17th, Tokyo, Japan

マクダーモット・インターナショナル・セミナーは、おかげさまで皆様よりご好評をいただき、11回目となるセミナーを東京で開催することが決定いたしました。 ...more

NAVEX

Key Regulatory Risks for Businesses to Navigate in 2024

NAVEX on

In the dynamic business landscape, regulatory legislation changes are constant. These alterations in laws often feel like an unrelenting force impacting senior leadership, compelling them to reassess and adjust existing...more

K2 Integrity

Transaction Monitoring and Risk Mitigation Strategies for Global Supply Chains

K2 Integrity on

Between export bans and the numerous entities and individuals now restricted from transacting in the global economy, organizations worldwide must evaluate the legal, reputational, and cybersecurity impacts on their supply...more

American Conference Institute (ACI)

[Event] 16th Annual Flagship Conference on U.S. Economic Sanctions Enforcement and Compliance - May 5th - 6th, Washington, DC

ACI’s Annual Flagship Conference on Economic Sanctions Enforcement and Compliance is widely regarded as the premier conference designed for those working in global sanctions compliance, internal audits and investigations,...more

Morgan Lewis

North Macedonia Proposals Should Follow European Union’s Balanced, Risk-Based Cybersecurity Approach

Morgan Lewis on

The European Union’s ongoing debate on how best to adequately frame and safeguard the secure implementation of 5G technology in EU and EU member state domestic legislation has reached the countries applying for accession to...more

Foley & Lardner LLP

Foley Weekly Automotive Report - July - 2

Foley & Lardner LLP on

This report helps automotive suppliers inform their legal and operational decisions to help address challenges and opportunities. Key Developments - Production downtime during July and August has been scheduled for five GM...more

Jones Day

COVID-19 Key EU Developments, Policy & Regulatory Update No. 22

Jones Day on

This regular update (no. 22 | 22 September 2020) covers key regulatory EU developments related to the evolving COVID-19 situation (Antitrust & State Aid; Trade/Export Controls; Medicines, Medical Devices and Personal...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide