Latest Posts › Cybersecurity

Share:

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

A covered entity will need to arrange for someone to perform the CISO function, dedicate resources to conduct periodic risk assessments, develop and implement policies and procedures, and retain appropriate personnel and...more

[Webinar] Data Protection Update: Joint Webinar with Travers Smith - March 9th, 12:00pm (EST) | 9:00am (PST)

The demise of the EU-US safe harbor arrangement has been bad news for many businesses in the US and the UK. A new "EU-U.S. Privacy Shield" deal in principle has just been announced as the replacement to the safe harbor but it...more

EU Court of Justice: Safe Harbor Decision Permitting EU-U.S. Personal Data Transfers Is Invalid

Ruling affects approximately 5,000 U.S. companies that have relied on the Safe Harbor to transfer personal data from the EU to the United States. Key Points - - The approach of the U.S. government to personal...more

Advocate General of the EU Court of Justice: EU-U.S. Safe Harbor Act Is Not Safe for EU Citizens

The decision could affect the thousands of U.S. companies in diverse industries that rely on the EU-U.S. Safe Harbor Agreement to legally transfer personal data of EU citizens from the EU to the United States....more

How to Avoid and Respond to a Cybersecurity Breach

In light of numerous recent data breaches, cybersecurity has emerged as an issue impacting organizations ranging from the local hardware store to the largest multi-national firms in the world. In short, no industry is immune...more

Is Your Financial Institution the Next Target of a Cyber-Attack? [Video]

Not worried about cybersecurity at your financial institution? Then you are in the minority. Cyber-risk was identified as the number one worry of bank risk managers at a panel of bank chief risk officers at the American...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

OCIE Cybersecurity Risk Alert: Keep Your Data Close and Your Third-Party Providers Closer

On February 3, the Securities and Exchange Commission’s Office of Compliance Inspections and Examinations (OCIE) published a Risk Alert that summarizes the OCIE’s observations from its recent examinations of registered...more

Privacy and Data Security 2015: President Obama’s Mandate for a Strong Tight-Knit Legislative Framework

In his January 20 State of the Union address, President Obama said, “We are a strong, tight-knit family who has made it through some very, very hard times.” This statement was used as a theme for the economic initiatives set...more

Ignoring XP End Of Life May Make Your Company An Attractive Target

On April 8, Microsoft officially ended all support and ceased providing updates for their Windows XP operating system. This “end of life” (EOL) announcement is not uncommon with software platforms, where continued support of...more

2014 Verizon Report Offers Advice For Combatting Nine Common Threats To Cybersecurity

The 2014 Verizon Data Breach Investigations Report (DBIR) was released on April 22, providing the deep empirical analysis of cybersecurity incidents we’ve come to expect from this annual report. The primary messages of this...more

SEC Issues Cybersecurity Initiative Risk Alert

On April 15, the U.S. Securities and Exchange Commission (SEC)’s Office of Compliance Inspections and Examinations (OCIE) issued a Risk Alert on its Cybersecurity Initiative. The Alert is intended to provide additional...more

4/29/2014  /  Cybersecurity , Data Protection , OCIE , SEC

Privacy And Data Security For Life Sciences And Health Care Companies

Pepper Hamilton Health Care-Life Sciences Webinar - The explosion of mobile technology and Web applications linking patients with doctors, pharmacies and medical devices is undergoing scrutiny by the FDA, FTC, HHS and...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately PPT Presentation

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

BYOD (Bring Your Own Device)... *Liability and Data Breach Sold Separately  [Video]

A majority of people recently surveyed believe that their cellphone is the first thing that gets noticed about them. With smartphones becoming a part of our identity and the convenience of carrying and using just one device,...more

Partly Cloudy With A Chance Of Data Breach

A report recently published by NIST sets forth steps federal agencies and the private sector providers who cater to them need to take to ensure the security of data stored and processed in the cloud....more

California Attorney General’s Report Reveals Millions Affected By Data Breaches In 2012

A report recently issued by the California Attorney General reveals that millions of Californians were the victims of a data breach in 2012, mostly due to intentional intrusions by outsiders or by unauthorized insiders....more

Unhack My Heart: FDA Issues Guidance To Mitigate Cybersecurity Threats In Medical Devices

A new guidance document from the FDA lists considerations and suggested steps to reduce the likelihood of cybersecurity breaches in medical devices....more

NIST Proposes Privacy Control Roadmap For Organizations

In an age in which safeguarding the privacy of a person’s information is becoming increasingly challenging, the National Institute of Standards and Technology (NIST) encourages organizations to devote time and resources to...more

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

Executive Order Begins Process Of Strengthening Nation’s Cybersecurity And Critical Infrastructure

During his State of the Union address on February 12, 2013, President Barack Obama announced his signing of a long-anticipated Executive Order on cybersecurity. After months of discussions with technology companies the...more

21 Results
/
View per page
Page: of 1

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.