News & Analysis as of

Incident Response Plans Data Protection Risk Management

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Lowenstein Sandler LLP

UPDATE: Organizations Using the Salesloft Drift AI Chat Agent Must Check It for Compromise

On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more

Lowenstein Sandler LLP

Salesforce Users: Organizations Using the Salesloft Drift AI Chat Agent with Salesforce Must Check Their Presence for Compromise

Lowenstein Sandler LLP on

Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more

Dinsmore & Shohl LLP

Making Your Business Cyber Secure

Dinsmore & Shohl LLP on

One key lesson from the ongoing ransomware epidemic is clear: threat actors don’t discriminate. It doesn’t matter who you are or what your business does — if they see an opening, they’ll exploit it, ready or not. Despite...more

Downs Rachlin Martin PLLC

Data Breach Preparedness: Protecting Your Organization Before, During and After a Cyber Incident

There’s an “old saying” when it comes to data breaches:  it’s not whether your organization will face a potential data breach, but when. So, given the inevitability of a data breach, it only makes sense to prepare. As a data...more

White & Case LLP

Cyber-attacks – What Does the Law Require?

White & Case LLP on

As major cyber-attacks continue to cause widespread organisational and economic disruption, and botnets are being discovered which have the capability of comprising entire organisations, many businesses are re-evaluating...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Integreon

Best Practices for Cyber Incident Prevention for Law Firms

Integreon on

In our global, digital-first economy, cyberattacks are no longer isolated incidents targeting large organizations. They are a very real threat to businesses of all types and sizes, and law firms are a common target of cyber...more

K2 Integrity

Information Leaks: How to Assess the Impact, Investigate the Cause, and Reduce the Likelihood of Future Breaches

K2 Integrity on

Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

Mitratech Holdings, Inc

5 Challenges in Incident Management (and How to Stay Resilient)

A single outage can spiral into hours of downtime, frustrated customers, and significant revenue loss across your business....more

Phelps Dunbar

How Can Companies Guard Against Rising Nation-State Cyber Threats?

Phelps Dunbar on

The messages from government agencies and cybersecurity leaders at the end of June were clear – nation-state-sponsored cybersecurity threats are on the rise. Pro-Iranian “hacktivists” are targeting U.S. infrastructure and...more

K2 Integrity

[Webinar] Information Leaks: How to Respond, Investigate, and Protect Your Business - June 25th, 9:00 am ET

K2 Integrity on

Information leaks can range from exposures of internal decisions and salary data to the disclosure of intellectual property, strategy documents, or board minutes. Whether accidental or intentional, these leaks demand...more

Schwabe, Williamson & Wyatt PC

Low-Budget, High-Impact Ways to Reduce Privacy and Cybersecurity Risks in 2025‎

1. Know What Laws Apply to your Organization It’s not surprising many leaders are unsure about which new laws or regulations apply to their organization. Privacy and security laws, particularly in the U.S., have changed...more

Mitratech Holdings, Inc

IT/DR Plan Spring Cleaning: How to Replace Outdated Policies

Ready to ditch outdated guidelines and adopt a fresh take on your IT Disaster Recovery plans? Spring is the season of renewal, making it the perfect time to refresh not only physical spaces but also strategies and...more

StoneTurn

2025 Incident Response Landscape: Practical Tips for Cybersecurity Readiness

StoneTurn on

Organizations seeking to improve their cybersecurity posture in 2025 must assess what happens after an incident has occurred, and how an incident response team will be able to mobilize to respond. This article provides...more

DLA Piper

CHINA: Mandatory Data Protection Compliance Audits from 1 May 2025

DLA Piper on

Chinese data regulators are intensifying their focus on the data protection compliance audit obligations under the Personal Information Protection Law (“PIPL“), with the release of the Administrative Measures for Personal...more

Ward and Smith, P.A.

Data Privacy Insights Part 2: The Most Common Types of Data Breaches Businesses Face

Ward and Smith, P.A. on

As part of Data Privacy Awareness Week, Ward and Smith is spotlighting the most common types of data breaches that businesses encounter. In Part 1, we explored the industries most vulnerable to cyberattacks, highlighting the...more

Sheppard Mullin Richter & Hampton LLP

Looking Beyond FedRAMP – Lessons from the U.S. Treasury Cybersecurity Incident

In the ever-evolving world of cybersecurity, even organizations that meet stringent security standards can be victims of sophisticated cyberattacks. A notable example of this is the December 8, 2024 cybersecurity incident...more

Epiq

After a Data Breach: Navigating Long-Tail Legal and Financial Risks

Epiq on

In recent years, data breaches have escalated from isolated technical issues to significant legal battles. Businesses are witnessing a sharp rise in data breach lawsuits, underscoring the growing legal risks associated with...more

Troutman Pepper Locke

6 Tips for Cos. Facing Service Provider Cyber Incidents

Troutman Pepper Locke on

It is no secret that ransomware dominates headlines, and cybersecurity incidents have become part of our everyday language. However, the criminal “business model” behind ransomware keeps evolving. Originally published in...more

U.S. Legal Support

10 Essential Cybersecurity Questions to Ask When Choosing a Litigation Support Services Partner

U.S. Legal Support on

In today’s digital age, robust cybersecurity measures are not just optional, but essential for law firms. Discover the critical questions to ask when selecting a litigation support services partner to help ensure your...more

Woods Rogers

FAR Council Publishes Proposed Rule Imposing New Security Requirements on Contractors Handling CUI

Woods Rogers on

On January 15, 2025, the Federal Acquisition Regulatory Council published a proposed rule (the FAR CUI Rule) that would amend the Federal Acquisition Regulation (FAR) to impose government-wide cybersecurity, training, and...more

105 Results
 / 
View per page
Page: of 5

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide