We get Privacy for work – Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
Driving Digital Security: The FTC's Safeguards Rule Explained — Moving the Metal: The Auto Finance Podcast
No Password Required: SVP at SpyCloud Labs, Former Army Investigator, and Current Breakfast Champion
No Password Required Podcast: Chief Product Officer at ThreatLocker and Advocate of Buc-ee’s, Mascots, and Buc-ee Mascots
No Password Required: Director and Cybersecurity Adviser at KPMG and Rain Culture Authority
AI Talk With Juliana Neelbauer - Episode Two - Cybersecurity Insurance: The New Frontier of Risk Management
On-Demand Webinar: Bring Predictability to the Spiraling Cost of Cyber Incident Response Data Mining
On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response
Unlock Privacy ROI: Why Making Cross-Functional Allies is Key
No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
Monumental Win in Data Breach Class Action: A Case Study — The Consumer Finance Podcast
Cost of Noncompliance: More Than Just Fines
Will the U.S. Have a GDPR? With Rachael Ormiston of Osano
Work This Way: A Labor & Employment Law Podcast | Episode 14: How Employers Can Navigate Cybersecurity Issues with Brandon Robinson, Maynard Nexsen Attorney
FBI Lockbit Takedown: What Does It Mean for Your Company?
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
Decoding Cyber Threats: Protecting Critical Infrastructure in a Digital World — Regulatory Oversight Podcast
Life With GDPR: Episode 104 – Solar Winds and Your Mother – Tell The Truth
No Password Required: American University’s Vice Provost for Research and Innovation and a Tracker of (Cyber) Unicorns
In Home Depot Inc. v. Steadfast Insurance Co., Home Depot learned the hard way a rule every DIY enthusiast knows: measure twice, cut once. It appears Home Depot’s measurements were off when it sized up its insurance needs,...more
The 2014 Home Depot data breach was one of the more notorious cyberattacks. A decade later, litigation over that incident continues. The Sixth Circuit recently decided whether an electronic data exclusion cleared insurers...more
Over the last decade, one of the most common gripes I’ve heard about cyber insurance is that policies “don’t pay out.” Cyber coverage is often perceived as being illusory and riddled with “gotcha” clauses. This isn’t the...more
Is your cyber insurance policy sufficient to protect your company? As criminals leverage AI and other emerging technologies to exploit vulnerabilities in cybersecurity defenses, it’s critical to assess your company’s...more
On this episode of Don't Take No for An Answer, host, Lynda A. Bennett, Partner and Chair of Lowenstein’s Insurance Recovery Group, is joined by David Anderson, Vice President, Cyber Liability at Woodruff Sawyer, and Heather...more
Cyber-crime is an increasingly prominent threat to many industries, and construction is no exception. With the growing use of digital technologies in what was once a primarily “offline” industry, cyber-attacks can pose a...more
Losses arising from email scams are usually covered, if at all, under a company’s crime policy. But a recent decision from The District Court in Minnesota suggests that recourse may also be found under an insured’s cyber or...more
Healthcare breaches, including ransomware attacks, continue to increase. As a result, many healthcare organizations seeking cyber coverage to help defray the costs associated with a ransomware attack or other data incident...more
1.0 CYBER MARKET UPDATE - 1.1 US Market Update - To call 2021 anything other than a sea change in the cyber insurance world would be an understatement. Indeed, nearly all cyber insurance renewals saw increases in...more
The cyber insurance landscape has never been more challenging for corporate insurance buyers. Increased retentions, huge premium increases, and narrowed coverage terms all have corporations searching for alternative solutions...more
Insurers that offer coverage for cyberattacks find themselves playing both offense and defense lately. As they await possible action by Congress to enact federal cybersecurity legislation, the insurance industry has gone on...more
The New York Department of Financial Services ("NYDFS") recently released its Cyber Insurance Risk Framework (the “Framework”), which provides best practices for managing cyber insurance risk....more
While most of society struggles to flatten the curve, treat the sick and restart the economy, regrettably, some bad actors have used the COVID-19 emergency as an opportunity to exploit vulnerabilities for personal gain. One...more
A Maryland federal court recently weighed in on the still-murky world of insurance coverage for cybersecurity losses, finding replacement costs necessitated by a ransomware attack were “direct physical loss or damage” to a...more
In this high tech era we live in, creating, storing and using data is commonplace. The sheer quantity and scope of data has made protecting that data of paramount importance. Yet, every day we hear about another data...more
As data are quickly becoming significant corporate assets, lawyers need to help companies both maximize the value of their data and protect the business against any associated risks. This is particularly true in M&A...more
2018 was the year of hearing from clients that they are convinced that they “have cyberliability insurance” to finding out that they really don’t have the coverage that they need for the most common cyber risks....more
Almost a year after Middle District Judge Mary Scriven’s instructive decision in Innovak Int’l, Inc. v. Hanover Ins. Co. in which she declined to hold that a traditional commercial general liability (CGL) policy, as drafted,...more
In the last decade, Disaster Recovery (“DR”) and Business Continuity Planning (“BCP”) have become “hot” topics, as companies attempt to deal with disasters and the associated business risks. “Force majeure” is a legal concept...more
There’s a tempest amidst the recent spring shower of “cyber” insurance cases. It isn’t the Recall Total case reported the week before last, or the Travelers v. Federal Recovery Services case reported the week before. While...more
With headlines of data breach incidents becoming a weekly, if not daily occurrence, it’s not surprising that many companies are considering whether they should purchase cybersecurity insurance, if they haven’t already. The...more
All employers have personnel data on their information technology systems and devices. This data includes personally identifiable information such as names, addresses, birth dates and Social Security numbers of employees and...more