News & Analysis as of

Information Security Cybersecurity

Morrison & Foerster LLP - Government...

Department of Defense Finalizes Long-Awaited Cybersecurity Rule

On September 10, 2025, the U.S. Department of Defense (DoD) published its long-awaited final rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to incorporate contractual requirements related to the...more

Hanson Bridgett

Understanding EDGAR Next

Hanson Bridgett on

The U.S. Securities and Exchange Commission (the “SEC”) adopted changes to its Electronic Data Gathering, Analysis, and Retrieval System (“EDGAR”) used by private and public companies and other reporting persons to submit...more

Schwabe, Williamson & Wyatt PC

FAR Council Issues Multi-Part Revisions

The FAR Council is undertaking a systematic approach to revising the FARs. On August 15, 2025, it released its revisions to FAR Part 4, Administrative and Information Matters, FAR Part 8, Required Sources of Supplies and...more

Fox Rothschild LLP

FTC Issues GLBA Safeguard Rule FAQs: What Motor Vehicle Dealers Need to Know

Fox Rothschild LLP on

The FTC has issued FAQs for Gramm-Leach-Bliley Act (GLBA) Safeguards Rule compliance by Motor Vehicle Dealers. Here is what you need to know: Step 1: Are you a financial institution? • You are if you either finance (or...more

IR Global

The Evolution of Business Succession in the Digital Era

IR Global on

Succession planning has long been a cornerstone of business continuity. It ensures that ownership transitions happen smoothly, that leadership changes do not disrupt operations, and that enterprise value is protected (or even...more

Thomas Fox - Compliance Evangelist

12 O’Clock High, A Podcast on Business Leadership – Leadership in Cybersecurity and Privacy with Robert Meyers

12 O’Clock High, an award-winning podcast on business leadership, brings together stories from history, the arts, sports, movies, research, and current events to consider leadership lessons. In this episode, Tom Fox welcomes...more

Jackson Lewis P.C.

We get Privacy for work — Episode 7: What Is a WISP and Why Your Organization Must Have One

Jackson Lewis P.C. on

Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to...more

Gardner Law

Why Every Manufacturer Needs a Robust Information Security Program

Gardner Law on

Drug and device manufacturers are increasingly targeted by cyber threats that can compromise patient safety, intellectual property, and other critical data and systems, while also facing new regulatory demands. As regulators...more

Fisher Phillips

Missouri Adopts New Data Breach Notice Law for Insurers – The 10 Things Insurers and Licensed Entities Need to Know

Fisher Phillips on

As cybersecurity threats escalate, state legislatures across the country are tightening requirements for how insurance entities respond to data breaches – and thanks to a new law just passed several weeks ago, Missouri is...more

American Conference Institute (ACI)

[Event] 8th National Forum on FOCI - September 29th - 30th, Washington, DC

Section 847 is widely regarded as a seismic shift that will result in a jump from 2,000 to 41,000 cases being processed annually! In anticipation of this, DCSA has been scaling up their resources and personnel. ACI’s 8th...more

Ankura

The Importance of Culture in an Effective Cybersecurity Program

Ankura on

While technology plays a pivotal role in cybersecurity, the human element is equally crucial. An organization's culture can significantly influence the effectiveness of its cybersecurity measures. A strong cybersecurity...more

K2 Integrity

World Password Day: Increasing Security in Two Steps

K2 Integrity on

May 1 is World Password Day, a day for organizations to remind their employees of the importance of using strong passwords and practicing good password hygiene to protect personal and work accounts. It’s a time for...more

Orrick, Herrington & Sutcliffe LLP

OCC provides an update on its security breach given institutional risk

On April 14, the OCC released a letter providing more details on the recent security breach involving its email systems. The breach — identified as a major incident under the Federal Information Security Modernization Act...more

Blake, Cassels & Graydon LLP

New Information Security Incident Framework for Quebec Financial Institutions

On April 23, 2025, Quebec’s Regulation respecting the management and reporting of information security incidents by certain financial institutions and by credit assessment agents (Regulation) will come into force. Issued by...more

Sheppard Mullin Richter & Hampton LLP

Insurance Cybersecurity Certifications: An (Updated) State Roundup

Over half of US states require annual compliance certifications from insurance providers. While the filing time frames for this year draw to a close, companies may want to keep them in mind not only for next year, but as a...more

Orrick, Herrington & Sutcliffe LLP

OCC announces major information security incident

On April 8, the OCC announced it had notified Congress of a major information security incident, as required by the Federal Information Security Modernization Act. The incident involved unauthorized access to emails and their...more

Latham & Watkins LLP

Latham Texas Private Funds Breakfast Series Navigating 2025 Exam Priorities Private Fund Advisers

Latham & Watkins LLP on

This winter, Latham’s Investment Funds Practice provided guidance on the Securities and Exchange Commission’s (SEC) 2025 examination priorities for private fund advisers in the latest installment of the Private Funds...more

Fox Rothschild LLP

Hawaii Issues Guidance to State Agencies on AI

Fox Rothschild LLP on

Hawaii’s State Data Office recently issued a series of guidance documents for its state agencies on how to handle artificial intelligence. This includes guidance on data protection, data retention and use of Generative AI....more

Mayer Brown

PRC Guidelines on Identifying Sensitive Personal Information

Mayer Brown on

The PRC National Technical Committee 260 on Cybersecurity of SAC (“TC260”) published new Guidelines on Identifying Sensitive Personal Information (“Guidelines”) on 18 September 2024, nearly three months after it released the...more

Orrick, Herrington & Sutcliffe LLP

OIG releases 2024 audit of the Fed’s information security program

On October 31, OIG for the Fed and the CFPB released its 2024 Audit of the Board’s Information Security Program. The audit found that the Board’s information security program continues to operate at a level-4 (managed and...more

White & Case LLP

SEC Will Prioritize AI, Cybersecurity, and Crypto in its 2025 Examination Priorities

White & Case LLP on

On October 21, 2024, the US Securities and Exchange Commission ("SEC") Division of Examinations ("Examination Division") announced its 2025 Examination Priorities ("Report"). Investment advisers and broker-dealers should...more

Orrick, Herrington & Sutcliffe LLP

NIS2: Where do European Countries Stand on Implementing Cybersecurity Strategies?

Country Status Legislation* Commentary Austria Available here Austria has submitted the “Network and Information Security Act” for Parliament’s consideration. It is anticipated that the “Network and Information Security Act”...more

K2 Integrity

Cybersecurity Awareness Month: Doubling Your Account Security With Multi-Factor Authentication - Update

K2 Integrity on

Cybersecurity Awareness Month was established more than 20 years ago to provide resources to enable organizations and their employees to stay safer and more secure online...more

Society of Corporate Compliance and Ethics...

Information Security and ISO 27001

ISO 27001 is the leading standard for information security management systems. As Mel Blackmore, CEO of UK-based Blackmores explains, it is a framework that applies and is of value regardless of an organization’s size, sector...more

HaystackID

[Webinar] From Breach to Insight: Incident Response & PII Recovery - May 29th, 12:00 pm EDT

HaystackID on

With escalating cyber risks and heightened regulatory scrutiny, every minute after a data breach is crucial. Sophisticated cybercriminals relentlessly target your organization’s most valuable asset: personally identifiable...more

229 Results
 / 
View per page
Page: of 10

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide