News & Analysis as of

Critical Infrastructure Sectors Data Protection

Hackers Could Target Airports, Planes, Satellites, Ships, Cars, and Trains

Cybersecurity for critical infrastructure continues to be of concern, including the transportation sector. A new study by ABI Research concludes that although the transportation sector continues to increase spending on...more

Draft Regulation Expands Critical Information Infrastructure Definition and Requirements

by Faegre Baker Daniels on

Another draft rule, “Regulation on the Security Protection of Critical Information Infrastructure” (Draft Regulation), was released for public comments on July 10, 2017, by the Cyberspace Administration of China (CAC). The...more

The Chinese Government Issued Draft Cybersecurity Regulations to Protect Critical Information Infrastructure

by Davis Wright Tremaine LLP on

On June 10, 2017, the Cyberspace Administration of China (the “CAC”) released the Draft Regulations on the Security Protection of Critical Information Infrastructure. The CAC is seeking public comments with a deadline of...more

Financial Services Quarterly Report - Second Quarter 2017: China Cybersecurity Law: Key Takeaways for Financial Services Firms in...

by Dechert LLP on

China’s Cybersecurity Law came into force on 1 June 2017, despite speculation that there would be a delay in its launch. The new law covers a wide range of activities relating to the cyberspace, including personal data...more

Executive Order on Cybersecurity: Considerations for Business - A fuller picture emerges on how the Trump Administration’s first...

On May 11th, in the wake of a series of wide-ranging cyber breaches and attacks plaguing public and private sectors alike, President Trump signed a long-awaited Executive Order on Strengthening the Cybersecurity of Federal...more

China’s Network Security Law Comes into Effect: What It Means for Your Company

by McDermott Will & Emery on

On June 1, 2017, China’s much anticipated Network Security Law comes into effect after two years of review, revisions over three drafts and a public commenting process. The law is a historical development for China’s...more

Presidential Executive Order on Cybersecurity: No More Antiquated IT

On May 11, President Donald Trump issued his long-awaited Executive Order on cybersecurity, the ‘‘Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.’’ It had been...more

China's Cybersecurity Law and Draft Implementation Rules

by Morgan Lewis on

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace...more

China's revised draft data localisation measures

by Hogan Lovells on

On 19 May 2017, the Cyberspace Administration of China (the “CAC“) released a revised draft of its Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of China Measures...more

#MLWashingtonCyberWatch: The Cybersecurity Executive Order (at last)

Amid the flurry following former FBI Director James Comey’s firing last week, President Trump marked his 111th day in office on Thursday, May 11th by signing an executive order targeting national cybersecurity....more

White House Issues New Cybersecurity Executive Order

by Ballard Spahr LLP on

President Trump recently signed the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The Order sets forth the Trump Administration's policy for cybersecurity of...more

Cybersecurity Considerations in the Energy Sector

by Hogan Lovells on

Cyber threats are pervasive, growing, and real, whether an individual is dealing with them professionally as a Cyber Security Practitioner (CSP) or has been touched by cybercrime in his or her personal life. In today’s...more

White House Signs New Cybersecurity Executive Order

by Dentons on

On May 11, 2017, President Donald Trump signed a new Executive Order on cybersecurity entitled Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. The new order is split up into three sections,...more

UK Parliament Passes New Digital Economy Act

by Hogan Lovells on

The Digital Economy Bill passed into UK law last Thursday 27 April 2017 amidst the flurry of activity known as the “wash up” period before the dissolution of Parliament and ahead of the early general election in the UK to be...more

China's draft data localisation measures open for comment

by Hogan Lovells on

On 11 April 2017 the Cyberspace Administration of China published a circular calling for comments on its draft Security Assessment for Personal Information and Important Data Transmitted Outside of the People’s Republic of...more

Trump Budget Raises Questions about Approach to Cybersecurity

by Nossaman LLP on

On Thursday, March 16, 2017, President Trump unveiled his “America First” budget blueprint. One of the most important quandaries for those in the cybersecurity world is how the proposal to reorganize the executive branch to...more

Global Privacy & Cybersecurity Update Vol. 13

by Jones Day on

On December 28, 2016, the New York Department of Financial Services ("DFS") released a revised version of a proposed regulation that would require banks, insurance companies, and other financial services institutions...more

China moves to implement security review of network products and services: but leaves foreign investor and manufacturer concerns...

by Hogan Lovells on

On 4 February 2017, the Cyberspace Administration of China issued a draft of the Network Products and Services Security Review Measures (“Draft Measures”) for public comment: the Draft Measures remain open for comments until...more

NIST’s Draft Update to Cybersecurity Framework Focuses on Third-Party Vendors and the Cost-Effectiveness of Cybersecurity Programs

On January 10, 2017, the National Institute of Standards and Technology (“NIST”) released a proposed update to its popular cybersecurity blueprint for organizations and businesses, known as the Framework for Improving...more

NIST Updates Cybersecurity Framework Guidance

by Hogan Lovells on

In the past month, the National Institute of Standards and Technology (NIST) has issued a draft update to its flagship cybersecurity framework as well as new standalone guidance on how organizations can plan to recover from...more

The Department Of Homeland Security Proposes New Rules Affecting Federal Government Contractors

This week, the Department of Homeland Security (“DHS”) issued three proposed rules expanding data security and privacy requirements for contractors and subcontractors. The proposed rules build upon other recent efforts by...more

Outgoing Homeland Security Chief: Cyber Security Has Improved But More Work Remains to Be Done

Following an election season characterized by missing emails, private servers and personal laptops, and amidst pervasive allegations of Russian cybercrimes, outgoing Secretary of Homeland Security Jeh C. Johnson issued an...more

Governor Cuomo Unveils Cybersecurity Proposals Including Cyber Incident Response Team

New York Governor Andrew Cuomo announced a series of cybersecurity proposals that are designed to protect consumers and government entities from cybercrime and identity theft. One of the proposals includes the creation of a...more

China's Cybersecurity Law Imposes New Requirements on Doing Business in China

by WilmerHale on

The Standing Committee of China's National People's Congress (NPC) adopted the country's Cybersecurity Law1 on November 7—the latest in a spate of national security-related measures targeting the ICT industry. Drafts of the...more

Cyber Update: What Businesses Must Know about the New Presidential Policy Directive

by Carlton Fields on

Last month the White House disclosed how the federal government will coordinate incident response activities in the event of a large-scale cyber incident. While the policy directive is worth reading in its entirety, this...more

58 Results
|
View per page
Page: of 3
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.