News & Analysis as of

Incident Response Plans Risk Management

Hanzo

Compliance Under Pressure: Audit Readiness for Healthcare Providers

Hanzo on

In today’s healthcare environment, compliance is a defining element of patient care quality, operational integrity, and public trust. Oversight from agencies such as the Office for Civil Rights (OCR), the Centers for Medicare...more

Ropes & Gray LLP

[Podcast] From Chaos to Clarity: Real-World Lessons in Navigating Corporate Crises

Ropes & Gray LLP on

On this Ropes & Gray podcast, Nitish Upadhyaya, director of behavioral insights at R&G Insights Lab, is joined by partners from Ropes & Gray’s global crisis management & investigations practice—Jim Dowden, Laura Hoey, Josh...more

Farella Braun + Martel LLP

Understanding the Importance of Data Asset Protection: Why Wineries Need to Pay Attention to Policies and Procedures

Data asset protection is traditionally associated with industries and entities that develop or store particularly sensitive information, like tech companies, hospitals, law firms, and government entities. However, data asset...more

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Lowenstein Sandler LLP

UPDATE: Organizations Using the Salesloft Drift AI Chat Agent Must Check It for Compromise

On August 28th, Mandiant issued an update to its previous Salesloft Drift advisory. Therein, Mandiant discussed that Salesloft issued a security notification on Aug. 26 regarding its Drift application. At that time, it...more

Lowenstein Sandler LLP

Salesforce Users: Organizations Using the Salesloft Drift AI Chat Agent with Salesforce Must Check Their Presence for Compromise

Lowenstein Sandler LLP on

Salesloft issued a security notification on August 26 regarding its Drift application. It appears to be a broad opportunistic attack on Salesloft/Drift instances integrated with Salesforce tenants. Salesloft issued updates...more

Alston & Bird

Rhode Island’s New Cybersecurity Law for Nonbank Financial Institutions

Alston & Bird on

Rhode Island has enacted Senate Bill 603 (SB603), effective July 2, 2025, establishing a comprehensive cybersecurity framework for nonbank financial institutions licensed by the state’s Department of Business Regulation...more

Dinsmore & Shohl LLP

Making Your Business Cyber Secure

Dinsmore & Shohl LLP on

One key lesson from the ongoing ransomware epidemic is clear: threat actors don’t discriminate. It doesn’t matter who you are or what your business does — if they see an opening, they’ll exploit it, ready or not. Despite...more

Downs Rachlin Martin PLLC

Data Breach Preparedness: Protecting Your Organization Before, During and After a Cyber Incident

There’s an “old saying” when it comes to data breaches:  it’s not whether your organization will face a potential data breach, but when. So, given the inevitability of a data breach, it only makes sense to prepare. As a data...more

Guidepost Solutions LLC

The Intersection of Cyber and Physical Security

Why Cyber and Physical Security Teams Can’t Afford to Work in Silos - In a world where everything from municipal water systems to hospital operating rooms depends on digital infrastructure, the convergence of cyber and...more

White & Case LLP

Cyber-attacks – What Does the Law Require?

White & Case LLP on

As major cyber-attacks continue to cause widespread organisational and economic disruption, and botnets are being discovered which have the capability of comprising entire organisations, many businesses are re-evaluating...more

DLA Piper

EU: ENISA Guidelines on Compliance with NIS 2 Directive Published

DLA Piper on

On June 26, 2025, the European Union Agency for Cybersecurity (ENISA) published two sets of guidelines to help businesses ensure their organizational compliance with the NIS2 Directive....more

The Volkov Law Group

AI Governance Best Practices (Part II of II)

The Volkov Law Group on

The new world of AI presents significant benefits and risks that need to be addressed in an overall governance framework. Luckily, the principles to apply here will surprise no one — governance, compliance, legal and risk...more

Orrick, Herrington & Sutcliffe LLP

AI Deepfakes: How Do We Protect Against AI Deepfakes?

How do I protect my executives from deepfakes? You can take several steps to protect your executives from deepfakes, including: Awareness: Educate executives about the risks and warning signs of deepfakes. Monitoring:...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Kilpatrick

5 Key Takeaways | Faulty Intelligence: Responding to an AI Incident

Kilpatrick on

Kilpatrick’s Greg Silberman recently led a session at the 21st annual KTIPS (Kilpatrick Townsend Intellectual Property Seminar) on “Faulty Intelligence: Responding to an AI Incident”, focusing on how legal, security, and...more

Dinsmore & Shohl LLP

Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team

Dinsmore & Shohl LLP on

With Herb Stapleton’s recent arrival to the Firm’s corporate team, Dinsmore adds a powerful asset to help clients stay ahead of cyber threats…or manage the fallout when the worst happens. As a former FBI agent and Special...more

Maynard Nexsen

Big Beautiful Bill Includes Funding for Offensive Cyber Operations – Insights and Implications

Maynard Nexsen on

The One Big Beautiful Bill Act (“OBBBA”) (Publ. Law 119-21), enacted in July 2025, is a sweeping piece of legislation that addresses many issues. Among them, it allocates $1 billion over four years to boost U.S. offensive...more

Integreon

Best Practices for Controlling Cyber Incident Response Costs

Integreon on

According to a recent IBM study, the cost of a data breach is the highest it has ever been, with 75% of the increase being due to the cost of lost business and post-breach response activities.  The lesson? Investing in...more

Integreon

Best Practices for Cyber Incident Prevention for Law Firms

Integreon on

In our global, digital-first economy, cyberattacks are no longer isolated incidents targeting large organizations. They are a very real threat to businesses of all types and sizes, and law firms are a common target of cyber...more

The Volkov Law Group

Episode 380 — NAVEX’s 2025 Hotline Benchmark Report

The Volkov Law Group on

NAVEX dominates the hotline market. Given its global footprint, NAVEX has access to a large database of employee reports. Building on this unique perspective, NAVEX provides an annual report analyzing the employee reporting...more

Mitratech Holdings, Inc

How Continuity Management Solutions Build Resilience

Business continuity used to live in a binder, often reviewed once a year and quickly forgotten. Today, it has become a critical part of day-to-day risk management and operational strategy....more

K2 Integrity

Information Leaks: How to Assess the Impact, Investigate the Cause, and Reduce the Likelihood of Future Breaches

K2 Integrity on

Information leaks can range from internal decisions and salary data to intellectual property, strategy documents, or board minutes. Whether caused by accident or intent, all leaks demand immediate, structured action. Even...more

Husch Blackwell LLP

NHTSA Closes Waymo Investigation: Key Takeaways for the AV Industry

Husch Blackwell LLP on

The National Highway Traffic Safety Administration (NHTSA) closed its 14-month investigation into Waymo, the autonomous vehicle (AV) subsidiary of Alphabet, finding no systemic safety violations. The probe examined 22...more

Constangy, Brooks, Smith & Prophete, LLP

Cybersecurity challenges in the health care industry: Legal, regulatory, and risk considerations

Health care remains one of the most targeted and vulnerable sectors when it comes to cyberattacks. In fact, a recent breach at a major health care analytics firm exposed the data of 5.4 million U.S. patients, making it one of...more

326 Results
 / 
View per page
Page: of 14

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide