News & Analysis as of

Incident Response Plans Data Security Risk Mitigation

Mitratech Holdings, Inc

The 2025 TPRM Study: Key Findings and Recommendations

The 2025 Mitratech Third-Party Risk Management (TPRM) Study conveys a clear message: the third-party risk landscape is evolving into a complex, interconnected ecosystem — one where every vendor, supplier, and partner plays a...more

Accelerynt, Inc.

Automating Identity Threat Response: Automating IP Blocking, Session Revocation, and Blocklist Management

Accelerynt, Inc. on

Credential-based threats—such as password sprays, token reuse, and low-complexity sign-in attempts—remain a constant operational burden. While these activities are easily detected in most environments, the workflows to fully...more

Integreon

On-Demand Webinar: Bring Predictability and Reduce the Spiraling Cost of Cyber Incident Response

Integreon on

Cyber breach costs are skyrocketing, and it is crucial for both insureds and insurers to stay on top of cyber incident response. ?? Ensure your incident response plan is robust ?? Avoid the volatile costs of dealing with...more

Mayer Brown

Communications in a Cyber Incident – Guidance

Mayer Brown on

The UK National Cyber Security Centre has published guidance on effective communications in a cyber incident. While targeted at organisations generally, rather than explicitly at pension scheme trustees, the guidance contains...more

DLA Piper

UK: NCSC Issue Guidance on How to Communicate Effectively in a Cyber Incident

DLA Piper on

Planning and developing an effective communications strategy is a critical step in preparing for a cyber security incident. Last week, the UK’s National Cyber Security Centre published guidance on communicating with...more

Mayer Brown

2024 Cyber Litigation Legal Update – What Your Business Needs To Know

Mayer Brown on

By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more

Wiley Rein LLP

[Webinar] Best Practices in Cyber Preparedness - October 23rd, 12:00 pm - 1:00 pm EDT

Wiley Rein LLP on

We invite you to join us for an insightful webinar on Best Practices in Cyber Preparedness for Government Contractors and Critical Infrastructure Operators on Wednesday, October 23, 2024, from 12:00 p.m. – 1:00 p.m. EDT....more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Epiq

The Importance of Data Security in Bankruptcy Claims

Epiq on

Data security is a major concern across virtually all areas of the legal profession particularly in 2024 thanks in part to a record-breaking number of cyber incidents last year that cost companies an average of $4.45 million...more

Robinson+Cole Data Privacy + Security Insider

Halcyon Provides Intel on Volcano Demon Ransomware

Security research firm Halcyon recently reported that it “encountered” a new ransomware organization dubbed Volcano Demon several times in the past few weeks....more

Womble Bond Dickinson

Cybersecurity Crunch: Building Strong Data Security Programs with Limited Resources - Insights from Tech and Financial Services...

Womble Bond Dickinson on

In today’s digital age, cybersecurity has become a paramount concern for executives navigating the complexities of their corporate ecosystems. With resources often limited and the ever-present threat of cyberattacks,...more

Kennedys

[Webinar] Days of reckoning: How to prepare for, respond to, and recover from ransomware and other cyberattacks - June 27th, 2:00...

Kennedys on

Kennedys and Booz Allen Hamilton are delighted to invite you to our 3 hour webinar on Thursday, June 27, 2024. This half-day seminar features three presentations: Clear and present danger, In the war room, and The fallout....more

HaystackID

[Webcast Transcript] From Breach to Insight: Incident Response & PII Recovery

HaystackID on

Editor’s Note: In this informative webcast, Christopher Wall, DPO and Special Counsel for Global Privacy and Forensics at HaystackID, moderates a compelling discussion titled “From Breach to Insight: Incident Response and PII...more

Kennedys

[Webinar] Ransom-ready: Navigating recovery, remediation and legalities - June 4th, 11:00 am - 12:00 pm EST

Kennedys on

Kennedys and CYPFER are delighted to invite you to our 60 minute webinar on Tuesday, June 4, 2024. We will explore the practical and legal implications involved in navigating a ransomware event, and how decision-making in a...more

Baker Donelson

Hackers Can Securely Enter Your Networks with XZ

Baker Donelson on

A security researcher found an intentionally placed backdoor in a software library called XZ Utils on April 2. This backdoor allows hackers to hijack secure sessions, or create their own, on devices within an organization's...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 3rd, Atlanta, GA

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 2nd, Charlotte, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - November 1st, Raleigh, NC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

Womble Bond Dickinson

[Event] Data Breach Response Workshop – Staying Calm in Crisis - October 30th, Washington, DC

Womble Bond Dickinson on

Join industry leaders and legal professionals as they step through a cyber incident response scenario and give real-time perspectives from the viewpoint of forensic investigation and mitigation, legal, cyber insurance, and...more

J.S. Held

Water Cybersecurity? EPA Mandates Regulations to Prevent Cyberattacks on Public Water Systems

J.S. Held on

EPA Aims to Mitigate Risk of Cyberattack on Public Water Systems On March 3, 2023, the U.S. Environmental Protection Agency (EPA) issued its Memorandum Addressing Public Water System (PWS) Cybersecurity in Sanitary Surveys or...more

Sheppard Mullin Richter & Hampton LLP

Ethics & Compliance: Let’s Talk About Cybersecurity

Over the past few months, the OIG shorts series focused on structuring and implementing a comprehensive and effective ethics and compliance program. Many times, this requires a mindset shift from a checking-the-box mentality...more

Baker Donelson

Beware of Cyber Attacks During the Holiday Season – Royal Ransomware Group Highlighted as Threats to the Health and Public Health...

Baker Donelson on

Statistics show that cybercrime increases significantly during the holiday season. Threat actors anticipate that workers are distracted and more likely to fall victim to a phishing email scam than any other time of the year....more

Goodwin

Nonprofit Organizations and Data Security Incidents — How to Manage and Respond

Goodwin on

As the number of data breaches, security incidents, and ransomware attacks continue to rise, preparation has become even more important — and make no mistake, these attacks are happening to all types of organizations. These...more

Opportune LLP

Defense In-Depth: Cybersecurity For Energy

Opportune LLP on

Glenn Hartfiel, Principal, and Geoff Yut, Consultant, at Opportune LLP discuss why recent geopolitical events are heightening the need for the implementation of improved cybersecurity measures in the energy industry, why...more

Robinson+Cole Data Privacy + Security Insider

Colorado Attorney General Issues Data Security Best Practices Guidance Document

The office of the Colorado Attorney General, Phil Weiser, recently issued a data security best practices guidance document as part of his office’s role in “implementing and enforcing data security and data privacy laws.” In...more

51 Results
 / 
View per page
Page: of 3

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide