News & Analysis as of

Incident Response Plans Data Breach Data Collection

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

Association of Certified E-Discovery...

[Webinar] What Does CISA and NIST Say About Forensic Investigations During a Breach? - November 7th, 10:00 am PST

In 2021 CISA released their Incident Response and Vulnerability Playbook, and in 2024 NIST updated their Cybersecurity Framework. Using the Playbook and Framework as a template, forensic teams can build a repeatable processes...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

BakerHostetler

FTC Amends Safeguards Rule to Require Notification of Unauthorized Data Acquisitions to the Agency

BakerHostetler on

Back in 2021, the FTC announced substantial changes to the Rule that imposed more detailed and rigorous security requirements for covered financial institutions and was largely based on the New York State Department of...more

Association of Certified E-Discovery...

[Webinar] Data Mining 2.0: How WatchtowerAI Transforms Incident Response - December 6th, 1:00 pm - 2:00 pm EST

In today’s digital landscape, organizations face a constant threat of cybersecurity incidents. Identifying sensitive information and promptly notifying relevant parties during an incident is a daunting challenge. The current...more

HaystackID

[Webcast Transcript] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions

HaystackID on

Editor’s Note: HaystackID hosted an educational webcast on March 15, 2023, to discuss the growing importance of cyber and data hygiene in the context of privacy, cybersecurity, and data protection. The webcast focused on how...more

HaystackID

[Webinar] Proper Hygiene Matters: Three Cybersecurity, Privacy, and Data Protection Challenges and Solutions - March 15th, 12:00...

HaystackID on

From nations and states to organizations and individuals, the focus on individuals’ fundamental rights and freedoms coupled with the common concerns for cybersecurity has driven the recognition and requirement for cyber and...more

Fisher Phillips

10 Ways Gig Economy Companies Can Protect Sensitive Customer and Worker Data

Fisher Phillips on

A recent blog post by the leader of a cybersecurity platform provides a suggestion as to how gig economy companies can protect all the sensitive data they accumulate – and we can add a few more items to that checklist. Arti...more

Health Care Compliance Association (HCCA)

Report on Patient Privacy Volume 22, Number 1. Privacy Briefs: January 2022

Report on Patient Privacy 22, no. 1 (January, 2022) - New Jersey issued its third settlement in three months on state-level health care privacy and security laws, announcing that three cancer care providers would adopt new...more

McDermott Will & Schulte

[Webinar] Globalization of Data – a Worldwide Lens on Privacy and Cybersecurity - May 26th, 12:00 pm - 1:00 pm EDT

With privacy and cybersecurity laws enacted or proposed in well over 100 countries, organizations must understand how to harmonize their cross-border compliance obligations. This webinar will assess the global stature of...more

Brooks Pierce

Sure, Hindsight Is 20/20 But These 2020 Cybersecurity New Year’s Resolutions Will Aid In Securing Your Business

Brooks Pierce on

In this day, data is often one of the most valuable assets companies have and it needs to be protected as such. Guarding data has become crucial for every business, no matter the size and industry. In the first half of 2019,...more

Jaburg Wilk

Everyone is Doing Business Online, and Most People are Doing it Wrong - 5 Practical Steps to Protect Your Customer Data

Jaburg Wilk on

Data breaches are inevitable. 2017 was the “year of the data breach,” with more exposure of personally identifiable information (“PII”) than ever before. If you were one of the 30% of US-based consumers who were notified of a...more

Skadden, Arps, Slate, Meagher & Flom LLP

Privacy & Cybersecurity Update - July 2017

In this month's edition of our Privacy & Cybersecurity Update, we examine new privacy laws in Germany, an FTC settlement with an alleged consumer loan company over unfair and deceptive practices, the dismissal of a data...more

13 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide