News & Analysis as of

Data Breach Cyber Threats National Institute of Standards and Technology

Mitratech Holdings, Inc

The Crucial Role of Business Impact Analysis (BIA) in Cyber Resilience

Cyber threats aren’t a distant possibility — they’re a daily reality. And according to IBM’s Cost of a Data Breach Report, they’re costing businesses more than ever. The global average data breach cost has surged to $4.88...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Ankura

Keeping Pace: The Evolution of Incident Response

Ankura on

Incident response (IR) has undergone a drastic transformation in the past two decades, adapting to the relentless evolution of the cyber threat landscape. In the early 2000s, as the internet became more deeply ingrained in...more

Ankura

FDA Authorized to Establish New Cybersecurity Standards for Medical Devices: What it Means for Industry

Ankura on

On December 29, 2022, President Biden signed a new statute that will significantly impact medical device cybersecurity regulation. Section 3305 of the Consolidated Appropriations Act of 2023 (“Section 3305”) authorizes the...more

EDRM - Electronic Discovery Reference Model

[Webinar] NIST CSF 2.0 – Back to the Future - March 7th, 1:00 pm - 2:15 pm ET

GREAT SCOTT! Did you know publication of the NIST Cybersecurity Framework (CSF) 2.0 is around the corner? Last updated in 2018, NIST is making substantial changes to the CSF due to evolving threats. What are these changes?...more

Polsinelli

Emerging Threats: Cyber Attacks and Side-Channel Evolution

Polsinelli on

“Side-Channel” attacks generally refer to a type of criminal cyber attacker activity that exploits vulnerabilities so that the attacker can collect and analyze “leakage” of data from a device, as a means to identify certain...more

Spilman Thomas & Battle, PLLC

Ransomware: Where We are and What is to Come

The technological era has wrought numerous changes in traditional crimes that have plagued society from time immemorial. Ransom attacks have long been recognized by criminals as a method of extracting money from a desperate...more

Health Care Compliance Association (HCCA)

To Combat Cyber Crime, White House Initiative Promises Tools; Some Seek Funding, New Laws

Report on Patient Privacy 21 no. 9 (September, 2021) - As ransomware attacks become epidemic and breaches get larger, the Biden administration is partnering with private industry to bolster security and education in an...more

Bilzin Sumberg

Do the 2021 Federal Ransomware Laws Foretell Passage of Federal Data Privacy Laws?

Bilzin Sumberg on

In the last several weeks, the Executive and Legislative branches of the United States federal government have taken bipartisan measures to defend the country’s infrastructure from the critical national security threat posed...more

King & Spalding

Ransomware on the Rise in Critical Infrastructure Sector

King & Spalding on

Recent ransomware attacks against U.S. critical infrastructure, which includes the energy sector’s production of oil and natural gas, and other sources of electricity and power, have shed a spotlight on the importance of...more

Holland & Knight LLP

Impact of the New Health Industry Cybersecurity Practices: 2019 Outlook

Holland & Knight LLP on

• The U.S. Department of Health and Human Services on Dec. 28, 2018, announced the release of the "Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients" that provides a "Call to Action" to make...more

Sheppard Mullin Richter & Hampton LLP

Ohio Gives Breach Safe Harbor for Companies with Written Data Security Program

Effective November 2, 2018, companies that suffer a breach may have certain defenses in Ohio if they have a written cybersecurity program in place. Under this new law, companies can use as an affirmative defense the existence...more

Jones Day

Global Privacy & Cybersecurity Update Vol. 14

Jones Day on

New York Attorney General Announces Record Number of Data Breach Notices in 2016 - On March 21, 2017, the New York Attorney General's Office announced that it received 1,300 reported data breaches in 2016—a 60 percent...more

Womble Bond Dickinson

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

Womble Bond Dickinson on

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

BakerHostetler

Incident Response Practice Tip: Balance Meeting Breach Notification Deadlines With Securing Your Network

BakerHostetler on

State breach notification statutes are being amended on almost a monthly basis. Several laws have, or will soon have, a mandatory notification deadline for notifying affected individuals after the discovery of the incident....more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - November 2014

In This Issue: - EU Issues Guidelines on ‘Right to be Forgotten’ - FFIEC Observations on Bank Cybersecurity Provides Important Guidelines for Every Industry - Remarks by Comptroller Curry Highlight OCC...more

Skadden, Arps, Slate, Meagher & Flom LLP

"Cybersecurity: Amid Increasing Attacks and Government Controversy, a Framework to Reduce Risk Emerges"

2013 likely will be considered a watershed period in the role of cybersecurity in corporate strategy and management. While there were few significant legislative developments, a marked increase in cybersecurity attacks...more

Perkins Coie

New FAR Rules Likely For "Critical Infrastructure" Contractors

Perkins Coie on

On February 12, 2013, President Obama signed an Executive Order (the Order) intended to enhance the cybersecurity of the country's critical infrastructure. According to the Order, "[t]he cyber threat to critical...more

18 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide