News & Analysis as of

Cybersecurity Supply Chain Risk Management

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Ice Miller

[Webinar] Cybersecurity Collaboration: Informing and Empowering the Defense Industrial Base - September 10th, 12:00 pm - 1:00 pm...

Ice Miller on

Join us for a timely and topical webinar hosted by Ice Miller, LLP, discussing cybersecurity collaboration and information sharing in the defense industrial base. The webinar also will feature a robust discussion of best...more

Spilman Thomas & Battle, PLLC

Technology Law Insights, V 6, Issue 8, 2025

Welcome to our eighth issue of 2025 of Decoded - our technology law insights e-newsletter. Cybersecurity Ranks Among Top Three Risks to Manufacturing Sector - “Most companies are planning major AI investments to address...more

Hogan Lovells

2025 Horizons Life Sciences and Health Care

Hogan Lovells on

In 2025, Life Sciences and Health Care (LS&HC) companies face rapidly evolving regulatory paradigms that create transactional risks and require daily monitoring. After more than 70 national elections in 2024, the dust hasn’t...more

Ankura

Unified Defense: Collaboration to Secure Critical Infrastructure

Ankura on

Securing national critical infrastructure is similar to securing a network enterprise. Each sector of infrastructure, network component, or branch of government depends on the other. Understanding those interdependencies,...more

Ankura

The Silent Epidemic: Infostealers and the Evolution of Cybercrime in 2025

Ankura on

"Infostealers" have transformed from niche threats into the backbone of modern cybercrime, fueling a $4.88 million average breach cost in 2024. In this article we synthesize the latest threat intelligence to expose critical...more

Secretariat

Five Key Recommendations to Strengthen Cybersecurity in Latin America and the Caribbean

Secretariat on

Cybersecurity is now a core element of legal, regulatory, and business risk management. In Latin America and the Caribbean, organizations face mounting pressure to demonstrate proactive compliance with evolving data...more

Cozen O'Connor

Continuing Trends & New Developments: CFIUS Releases 2024 Report to Congress

Cozen O'Connor on

The Committee on Foreign Investment in the United States (CFIUS) recently published its 2024 Calendar Year Annual Report, which illustrates recent and historical trends relating to CFIUS’s review of investments in U.S....more

Maynard Nexsen

Big Beautiful Bill Includes Funding for Offensive Cyber Operations – Insights and Implications

Maynard Nexsen on

The One Big Beautiful Bill Act (“OBBBA”) (Publ. Law 119-21), enacted in July 2025, is a sweeping piece of legislation that addresses many issues. Among them, it allocates $1 billion over four years to boost U.S. offensive...more

McDermott Will & Schulte

Europe’s Cybersecurity Puzzle: NIS2 Progress in 30 Pieces

As cybersecurity rises to the top of the corporate agenda, businesses face growing pressure to comply with the EU’s evolving regulatory landscape. Whether your company falls directly under EU cybersecurity laws or is...more

A&O Shearman

Mitigating third-party provider cybersecurity risks navigating the Australian legal framework

A&O Shearman on

Cybersecurity breaches originating from third-party providers (TPPs) are an escalating concern for Australian businesses. As supply chain risks grow, there is a mounting public expectation that the entity that commissioned...more

Mitratech Holdings, Inc

How Continuity Management Solutions Build Resilience

Business continuity used to live in a binder, often reviewed once a year and quickly forgotten. Today, it has become a critical part of day-to-day risk management and operational strategy....more

Goodwin

America’s AI Action Plan Emphasizes Governance and Risk Management to Promote the Secure and Safe Adoption of AI Tools

Goodwin on

On July 23, 2025, the Trump Administration released its AI Action Plan (“the Plan”), a long-anticipated roadmap for the federal government’s approach to AI governance that presents a number of implications for businesses...more

Clark Hill PLC

How does Executive Order 14306 shift the cyber strategy for government contractors?

Clark Hill PLC on

On June 6, a new Executive Order (EO) on cybersecurity altered the compliance landscape for federal contractors. The order pauses the imminent requirement for software vendors to formally attest compliance with the Secure...more

Foley & Lardner LLP

Episode 36: Let’s Talk Compliance: The Risks and Pitfalls of Health Care Supply Chain Compliance

Foley & Lardner LLP on

In this episode, Monica Chmielewski, vice chair of Foley’s Health Care Practice Group and Shannon Sumner, Chief Compliance Officer and Nashville’s Office Managing Principal of PYA explore how supply chain compliance is...more

Wiley Rein LLP

The FCC’s National Security Mandate: The Rise of the Council on National Security

Wiley Rein LLP on

The Federal Communications Commission (FCC) has taken significant steps to institutionalize national security within its regulatory framework through the creation of the Council on National Security (CNS). Chaired by Chairman...more

Guidepost Solutions LLC

Future-Proofing Your Data Center: A Strategic Imperative

In 2023, a data center experienced a complete power loss during a scheduled electrical grid maintenance. Less than five months later, that same facility faced another major power outage. However, this time the impact was...more

Morrison & Foerster LLP

NIS 2: Strengthening Europe’s Cyber Defenses

European cybersecurity risk management and reporting obligations have received a substantial facelift. The Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the EU (“NIS 2”) became effective...more

Goodwin

The Devil’s in the Details: Executive Order on Cybersecurity Reveals Administration’s Focus on AI-Cyber Convergence, Secure...

Goodwin on

On June 6, 2025, President Trump issued an Executive Order entitled “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144” (the “Order”). The measure...more

Woodruff Sawyer

Managing Your Supply Chain Cyber Risk

Woodruff Sawyer on

Most organizations rely on complex supply chains, and that reliance has become a point of vulnerability for cyberattacks. This spring, we have witnessed a large-scale cyberattack on a major British multinational retailer due...more

Blake, Cassels & Graydon LLP

House of Commons Re-Introduces Federal Cybersecurity Legislation

On June 18, 2025, the Minister of Public Safety introduced Bill C-8, An Act respecting cyber security, amending the Telecommunications Act and making consequential amendments to other Acts (Bill C-8). If passed, Bill C-8...more

Alston & Bird

NSA, CISA, FBI, and International Partners Issue Joint Guidance on AI Data Security

Alston & Bird on

Artificial intelligence (AI) systems are vulnerable to more than just threat actors. Our Privacy, Cyber & Data Strategy Group examines joint guidance issued by U.S. and international cybersecurity agencies that provides best...more

McCarter & English, LLP

Don’t Get Caught in Scattered Spider’s Web

The cybercrime group known as Scattered Spider is at it again, according to Google’s Threat Intelligence Group. This criminal group is known to focus its cyber attacks on one sector at a time. Last spring, it was the retail...more

HaystackID

New AI, New Risks: Inside GenAI’s Cybersecurity Dilemma

HaystackID on

Generative artificial intelligence, once the subject of experimental labs and speculative fiction, is now a central force in digital transformation, and cybersecurity professionals are finding themselves on unfamiliar ground....more

Jackson Lewis P.C.

The Growing Cyber Risks from AI — and How Organizations Can Fight Back

Jackson Lewis P.C. on

Artificial Intelligence (AI) is transforming businesses—automating tasks, powering analytics, and reshaping customer interactions. But like any powerful tool, AI is a double-edged sword. While some adopt AI for protection,...more

McCarter & English Blog: Government Contracts...

The Need for Speed: DoD’s “Software Fast Track” Targets Bureaucracy at Mach 2

The Department of Defense (DoD) is revving its engines again—this time to rocket past its own software acquisition drag. Launched via an April 24 memo from Acting DoD CIO Katie Arrington, the DoD’s Software Fast Track (SWFT)...more

146 Results
 / 
View per page
Page: of 6

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide