Brian Meenagh

Brian Meenagh

Latham & Watkins LLP

Contact  |  View Bio  |  RSS

Latest Publications

Share:

Prevent and Prepare for a Cybersecurity Breach

Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

11/22/2016 - CISO Cybersecurity Data Protection Hackers Risk Assessment

Mitigating Cybersecurity Risks

Hacking of organisations’ systems is becoming increasingly commonplace, even with advancements in security practices. To mitigate risk, a company must have an enterprise-level, cross-functional incident response plan that is...more

11/10/2016 - Cybersecurity Data Breach Risk Management Security and Privacy Controls

5 Preventative Steps to Manage Legal Risk Following a Cybersecurity Breach

Preparing for and rehearsing how to respond to a breach is as important as improving security systems and protocols. Hacking of organizations’ systems is becoming increasingly commonplace, even with advancements in...more

11/9/2016 - Best Practices Cyber Attacks Cybersecurity Risk Assessment Risk Management

3 Key Considerations Before You Begin Outsourcing in Qatar, Saudi Arabia or the UAE

Outsourcing has historically not been a major pillar in Middle East public and private sector organisation’s strategic architecture. While the benefits of outsourcing are understood and recognised, organisations have sought...more

2/15/2016 - Joint Venture Middle East Outsourcing Procurement Guidelines Qatar Saudi Arabia Third-Party Service Provider United Arab Emirates

DIFC in Dubai Says Transfer to US Cannot Rely on Safe Harbor

On October 26, 2015, Raja Al Mazrouei, the Commissioner for Data Protection for the Dubai International Financial Centre (the DIFC), issued guidance on the adequacy of US Safe Harbor for the purpose of exporting personal data...more

10/28/2015 - Data Protection Data Protection Authority Dubai EU EU Data Protection Laws European Court of Justice (ECJ) International Data Transfers New Guidance Safe Harbors Schrems v Data Protection Commissioner

The USA Freedom Act: What it Changes and (Mostly) Doesn’t for Cloud Services – And is it Really the Issue

The recent showdown over renewal of certain provisions of the USA Patriot Act (often called simply the Patriot Act) and the subsequent enactment of the USA Freedom Act have raised a number of questions about the ongoing...more

7/9/2015 - Cloud Computing Cross-Border Data Collection Data Protection Electronic Communications Encryption FISA Jurisdiction Patriot Act Telecommunications USA Freedom Act

How Oil and Gas Companies can Optimize Technology Performance and Costs During Oil Price Volatility

An unexpected surge in production coupled with weakened global demand has resulted in a 50 percent drop in the price of crude oil since June 2014 and currently averaging US$50 a barrel. The Organization of the Petroleum...more

1/21/2015 - Asset Management Cloud Computing Energy Sector Information Technology Oil & Gas OPEC Outsourcing Vendors

Navigating the Risks of Omnichannel Retail

Digital innovation is reinventing the retail experience. IT is changing the way retailers interact with customers by integrating sales and communication channels, enabling in-store digital interfaces and diversifying payment...more

1/13/2015 - Electronic Communications Internet Retailers Online Platforms Retailers Technology

As Bitcoin Gains Momentum, Focus on Regulation Increases

The virtual currency market has emerged in the United Arab Emirates with Dubai’s first Bitcoin ATM introduced in April 2014. Middle East entrepreneurs have begun launching Bitcoin payment products and SMEs are beginning to...more

11/24/2014 - Bitcoin CFTC Popular SMEs UAE Virtual Currency

5 Ways to Protect your Business from a Cyber Attack

Global cyber-attack threats stand at the highest ever recorded level, jumping 14 percent from 2012 to 2013 (Cisco 2014 Annual Security Report). Furthermore, a recent Microsoft Security Intelligence Report found that operating...more

9/11/2014 - Cybersecurity Data Protection Popular

Outsourcing Governance Part 2 - Using the Contract Tools

Successfully managing an outsourcing contract requires customers both to include the right governance tools and mechanisms in their contracts and then use those tools appropriately. Outsourcing contracts are not all created...more

10/24/2013 - Contract Drafting Corporate Governance Outsourcing

Outsourcing Governance Part 1 - Analysis of Contract Tools

Successfully managing an outsourcing contract requires customers both to include the right governance tools and mechanisms in their contracts and then to use those tools appropriately. Outsourcing contracts are not all...more

10/24/2013 - Contract Drafting Corporate Governance Outsourcing

How to Effectively Manage Outsourcing Contracts

The Middle East is emerging as one of the biggest growth markets for outsourcing. Organizations seeking cost and efficiency savings combined with greater continuity and risk management are switching to outsourcing as a...more

10/23/2013 - Middle East Outsourcing

13 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×