News & Analysis as of

Regulatory Requirements Cybersecurity Risk Management

Mitratech Holdings, Inc

Third-Party Risk Management: The Definitive Guide

In a world with increasingly interconnected companies, vendors, suppliers, logistics partners, and cloud services providers, Third-Party Risk Management (TPRM) has advanced from being an annual checklist exercise to a...more

Warner Norcross + Judd

[Event] Bridging the Risk Gap: Legal Strategies for Supply Chain Resilience - October 7th, Detroit, MI

In today’s rapidly evolving global landscape, supply chain leaders face mounting challenges — from shifting regulatory frameworks to rising cybersecurity threats and increasing geopolitical uncertainty. This half-day seminar...more

Ward and Smith, P.A.

Data Security and National Security: Are You the Weak Link?

Ward and Smith, P.A. on

International cybercrime is not new.  As a business owner in today's interconnected economy, you know all about the need to protect your technology, financial accounts, business operations, and customer data from digital...more

Lighthouse

M365 Academy: The Power of Sensitivity Labels in Microsoft 365

Lighthouse on

Read takeaways from our recent M365 Academy webinar on sensitivity labels, which covered how labels support governance across M365, from taxonomy design and classification to Copilot oversight, DLP, Insider Risk, and...more

Jackson Lewis P.C.

Florida AHCA Proposed Rules Would Establish New Breach Reporting, Continuity Planning Requirements

Jackson Lewis P.C. on

On September 17, 2025, the Florida Agency for Health Care Administration (AHCA) will hold its first public meeting to discuss proposed rules designed to enhance transparency and preparedness around health care information...more

Ice Miller

[Webinar] Cybersecurity Collaboration: Informing and Empowering the Defense Industrial Base - September 10th, 12:00 pm - 1:00 pm...

Ice Miller on

Join us for a timely and topical webinar hosted by Ice Miller, LLP, discussing cybersecurity collaboration and information sharing in the defense industrial base. The webinar also will feature a robust discussion of best...more

Bilzin Sumberg

The Legal Risks of AI in the Homebuilding Industry

Bilzin Sumberg on

Artificial intelligence (AI) is increasingly transforming the homebuilding industry, bringing new efficiencies to design, project management, supply chain coordination, and customer engagement. With its tantalizing promise of...more

Gardner Law

Cybersecurity and the FCA: Illumina Signals "No Breach" Enforcement Risks

Gardner Law on

A $9.8 million False Claims Act (FCA) settlement between Illumina Inc. and the U.S. Department of Justice (DOJ) is unique among cybersecurity enforcement actions because it didn’t result from a data breach, but, according to...more

Alston & Bird

Rhode Island’s New Cybersecurity Law for Nonbank Financial Institutions

Alston & Bird on

Rhode Island has enacted Senate Bill 603 (SB603), effective July 2, 2025, establishing a comprehensive cybersecurity framework for nonbank financial institutions licensed by the state’s Department of Business Regulation...more

Holland & Knight LLP

Finanzas abiertas en Colombia: SFC amplía el plazo para que entidades cumplan con estándares

Holland & Knight LLP on

La Superintendencia Financiera de Colombia (SFC), publicó el 6 de agosto de 2025, la Circular Externa 009 de 2025 por medio de la cual se amplía el plazo que inicialmente se había otorgado a las entidades sometidas a la...more

Baker Donelson

Ten Key Insights from IBM's Cost of a Data Breach Report 2025

Baker Donelson on

IBM and the Ponemon Institute have released the 2025 Cost of a Data Breach Report. The report, which has become an annual late-summer tradition, highlights the evolving risks and costs associated with data breaches. This...more

Hogan Lovells

2025 Horizons Life Sciences and Health Care

Hogan Lovells on

In 2025, Life Sciences and Health Care (LS&HC) companies face rapidly evolving regulatory paradigms that create transactional risks and require daily monitoring. After more than 70 national elections in 2024, the dust hasn’t...more

Osano

The Privacy Insider Podcast Episode 17: Security, Cyber-Intel, and a Sense of Humor with Nir Rothenberg of Rapyd

Osano on

Nir Rothenberg, Chief Information Security Officer of Rapyd, joins us to discuss why building resilient privacy and security frameworks is critical now as fintech companies face heightened scrutiny. With Rapyd expanding...more

Osano

The Data Privacy Certification Guide

Osano on

Unless businesses start hiring psychics, certifications will continue to be a critical way for experts to prove that they know what they're talking about. Whether you're looking to hire a privacy professional with the right...more

Coblentz Patch Duffy & Bass

Navigating the Shifting AI Landscape: What U.S. Businesses Need to Know in 2025

Artificial intelligence is no longer a wild west frontier technology—it’s a regulated one. As AI systems become central to how companies operate, communicate, and compete, legal oversight is catching up. In 2025, AI...more

Morris, Manning & Martin, LLP

Do you know what your AI is doing?

Imagine signing off on an update to your customer support portal and later discovering that an AI agent the development team added to the portal has been quietly sending snippets of support tickets to an unsecured LLM for...more

Katten Muchin Rosenman LLP

ESAs Publish Guide on Oversight of Critical ICT Third-Party Service Providers under DORA

The European Supervisory Authorities (ESAs) recently published a comprehensive guide (Guide) on the oversight of critical information and communications technology (ICT) third-party service providers (CTPPs) under the EU...more

Hogan Lovells

The EU NIS2 Directive and intra-group IT services

Hogan Lovells on

Key takeaways The EU NIS2 Directive defines cybersecurity obligations also for entities providing IT services only within their own corporate group of companies. To assess the applicability of these obligations, the necessary...more

Morrison & Foerster LLP

From Policy to Practice: Nick Johnston on Navigating AI, Privacy, and Risk AI Wins, AI Fails - Part 1: Nick Johnston on What...

Welcome to the inaugural episode of PDS+, a new podcast series hosted by Morrison Foerster partners Kaylee Cox Bankston and Boris Segalis. The podcast is dedicated to exploring the intersection of privacy, cybersecurity, and...more

Foley & Lardner LLP

Another FCA Cybersecurity Settlements Highlight DOJ’s Enforcement Priorities

Foley & Lardner LLP on

The United States Department of Justice (DOJ) recently announced another settlement agreement showing that DOJ continues to prioritize cybersecurity enforcement under the False Claims Act (FCA). According to the press...more

Herbert Smith Freehills Kramer

Built to Last: The Resilient Infrastructure Challenge

As climate change, geopolitical instability, cyber threats and surging demand place more pressure on infrastructure, governments, investors and operators must rethink what it means for assets to be truly resilient....more

White & Case LLP

Cyber-attacks – What Does the Law Require?

White & Case LLP on

As major cyber-attacks continue to cause widespread organisational and economic disruption, and botnets are being discovered which have the capability of comprising entire organisations, many businesses are re-evaluating...more

Health Care Compliance Association (HCCA)

‘We Cannot Do It Alone’: Cutbacks in Federal Funds, Engagement Spur Cries for HIPAA Help, New Laws

At the very top of Fisher-Titus Medical Center’s website is a link to the Change Healthcare HIPAA notice informing visitors of the last day to register for credit monitoring related to the world’s largest breach, which...more

Skadden, Arps, Slate, Meagher & Flom LLP

NIS2 Update: EU Cyber Authority Sets Out Compliance Expectations, but Implementation Is a Work in Progress

- What is new: On 26 June 2025, the EU Agency for Cybersecurity (ENISA) published guidance documents setting out security measures that regulated organisations should have in place to comply with the EU’s critical...more

DLA Piper

EU: ENISA Guidelines on Compliance with NIS 2 Directive Published

DLA Piper on

On June 26, 2025, the European Union Agency for Cybersecurity (ENISA) published two sets of guidelines to help businesses ensure their organizational compliance with the NIS2 Directive....more

355 Results
 / 
View per page
Page: of 15

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide