News & Analysis as of

Risk Mitigation Vendors Data Security

BakerHostetler

[Event] Data Dilemmas: Avoiding the Road to Ruin - September 25th, Atlanta, GA

BakerHostetler on

Data is at the center of our digital economy and provides endless ways to interact and connect with customers. Maintaining more data means taking on more risk. Join us for an interactive program that begins in the middle of a...more

Genova Burns LLC

DoorDash Hacker Incident Illustrates Third-Party Vendor Risks and Potential Vulnerabilities

Genova Burns LLC on

​​​​​​​Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more

U.S. Legal Support

[Webinar] Culture of Confidentiality: How to ensure your external vendors are mitigating cybersecurity risk - July 20th, 10:00 am...

U.S. Legal Support on

Despite strengthening security across and beyond the business, many legal organizations overlook a critical vulnerability with surprising frequency – the risk presented by third parties. Cybersecurity risk is further...more

Vinson & Elkins LLP

[Webinar] Navigating Privacy Rules in a Virtual World - June 17th, 10:00 am - 11:00 am PT

Vinson & Elkins LLP on

The transformation to a work from home/work from anywhere model has become the new normal and even after the pandemic ends, many expect that model to continue. This accelerated transition has forced companies to embrace...more

BakerHostetler

Dramatic Increase in the Number of Third-Party Vendor Incidents Emphasizes the Need for Better Vendor Due Diligence Processes

BakerHostetler on

As reflected in our 2021 Data Security Incident Response Report  2020 saw a sharp spike in the number of incidents involving vendors, which amounted to over 25 percent of the total incidents handled in 2020, and the trend is...more

Carlton Fields

Ledgers and Law: Real-World Planning for Cyber Attacks

Carlton Fields on

The COVID-19 pandemic has changed the way millions of people work. Remote workers are especially vulnerable to cyber threats such as ransomware and business email compromise. Joe Swanson, chair of Carlton Fields’...more

Hudson Cook, LLP

Vendor Service Contracts - Not Just Arm's Length Transactions Anymore

Hudson Cook, LLP on

The Consumer Financial Protection Bureau's Compliance Bulletin and Policy Guidance; 2016-02, Service Providers addresses the CFPB's expectation that companies oversee their business relationships with service providers in a...more

Health Care Compliance Association (HCCA)

[Event] March Privacy Compliance Academy - March 9th - 12th, San Diego, CA

Dive into a broad spectrum of topics affecting healthcare organizations. Explore the latest laws, regulations, and developments to help you effectively manage your organization’s privacy compliance program. Our Academies are...more

Hudson Cook, LLP

CCPA Advent: Waiting on the World to Change

Hudson Cook, LLP on

January 1, 2020, opens both a new decade and a new landscape in privacy regulation in the United States. On that day, the California Consumer Privacy Act, or CCPA, is set to become effective. The law will be the first of its...more

Health Care Compliance Association (HCCA)

[Event] Healthcare Privacy Compliance Academy - January 13th - 16th, Lake Buena Vista, FL

Dive into a broad spectrum of topics affecting healthcare organizations. Explore the latest laws, regulations, and developments to help you effectively manage your organization’s privacy compliance program. Our Academies are...more

The Volkov Law Group

Lessons Learned from the Capital One Data Breach (Part I of III)

The Volkov Law Group on

Not to say, I told you so, but around the same time that the Capital One data breach occurred, I was reminding clients that nearly half of  all significant data breaches or cyber-incidents occur because of internal actors. ...more

Bradley Arant Boult Cummings LLP

Grid Electrification: Addressing Cybersecurity Threats and Mitigating Risk in the Renewable Energy Era - ABA Forum

Technology and the critical infrastructure that support our personal pursuits and business operations are ripe targets for cyberattacks. In particular, the electrical grid that transmits electricity from its point of...more

Epiq

Seven Questions to Ask Your eDiscovery Vendor About Data Security

Epiq on

As recent news reports have illustrated, law firms are prime targets for hackers looking to steal or infect highly sensitive client and customer data. The reason is that these firms – as well as other outside suppliers who...more

Tucker Arensberg, P.C.

School Districts to Undergo Cybersecurity Audit

Tucker Arensberg, P.C. on

Missouri Auditor Nicole Galloway recently announced plans to conduct cybersecurity audits of five school districts. Coinciding with National Cybersecurity Awareness Month, the audits are intended to reveal how school...more

14 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide