Cyber Attacks

News & Analysis as of

The New Face of Commercial Crime - Cybersecurity Risks for Companies and their Directors

The threat of commercial crime against companies is transforming. Technology has created new and innovative ways for fraudsters to exploit individuals and companies through cyber attacks. This new face of fraud can give rise...more

Tearing Down the Silos

AML and cybersecurity teams must discover what they have in common, identify mutual strengths and weaknesses, and move toward an effective fusion of functions, processes, and mindsets. ...more

Are you covered? Emerging issues for health care providers under cyber risk insurance

Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren't expected to slow down in 2016, Harry Greenspun, director for Deloitte's...more

Skirmishes Along The Cyber Coverage Frontier: Hotel Monteleone And Lloyd’s Of London Fight Over PCI-Related Losses After Data...

While the market for specialty cyber insurance policies has heated up considerably over the past few years, a good deal of uncertainty still affects the market as the scope of these newly-minted policy provisions remains...more

Fraternal Order of Police data breach

The nation’s largest police union recently suffered a data breach enabling hackers to steal hundreds of private internal documents including bargaining contracts, the names and addresses of several police officers, and...more

Hedge Fund Standards Board Publishes Findings From First Cyber-Attack Simulation

On January 21, the Hedge Fund Standards Board (HFSB) released the results of its first cyber-attack simulation (via a press release dated January 19)....more

Business Litigation Alert: "Will There Be a Jump in Cyber Attacks in 2016? Survey Says... Yes"

Last year, we saw some major cyber breaches affect millions of Americans (remember the June 2015 hack of the federal Office of Personal Management that impacted over 20 million Americans?). Unfortunately, cyber-attacks do not...more

Corporate and Financial Weekly Digest - Volume XI, Issue 4

SEC/CORPORATE - Crowdfunding Portals Can Now Register With the SEC - As discussed in the November 6, 2015 edition of the Corporate and Financial Weekly Digest, on October 30, 2015, the Securities and Exchange...more

Spear-phishing campaigns continue to infiltrate critical infrastructure

The Department of Homeland Security’s Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT) has reported that critical infrastructure systems in the U.S. experienced a 20% increase in cybersecurity...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

Ukranian cyber hacker pleads guilty

Sergei Vovnenko, a Ukranian hacker, pleaded guilty last week in federal court in Newark, New Jersey to aggravated identity theft and conspiracy to commit wire fraud by using more than 13,000 computers to steal log-in...more

UK Financial Regulatory Developments - January 2016 #11

HFSB reports on cyber-attack simulation - HFSB has published the results from its first table top cyber-attack simulation for hedge fund managers in London. The objective was to explore responses to three realistic...more

Responding to a Security Breach: Insurance

It is an otherwise normal day until you, the General Counsel, receive a call from the CIO: “We have a cyber-security breach. We’ve identified some unusual activity and it appears that data has been sent out through unknown...more

"US Economic Sanctions: New List-Based Programs"

While economic sanctions against Iran, Russia and Cuba have dominated the headlines over the past year, sanctions remain a dynamic component of U.S. foreign policy on other fronts. In 2015, President Barack Obama issued three...more

Cybersecurity and Data Breaches: How In-House Counsel Can Engage the Board

A company's board of directors has a duty to oversee all aspects of the company's risk management efforts. This includes a duty to recognize and minimize the company's exposure to cyber attacks. In today's increasingly...more

Rise in Cyberattacks on Professional Services Firms

Wilson Elser’s Cyber Incident Response Team has seen an alarming uptick in cyber-criminal activity targeted at professional services firms, particularly accounting firms. As described in more detail below, the criminal...more

Five Questions Clients Asked Most Often in 2015 About Incident Response

We provided incident response and incident response preparedness services to hundreds of companies in 2015. The questions we answered were as unique and varied as the incidents companies faced....more

The Privilege of PR: Application of the Attorney-Client Privilege to Crisis Communications and Public Relations in Breach Response...

Cyber-attacks have become a matter of everyday reality for all businesses: regardless of industry or size, it is no longer if a data breach will happen, but when. And waiting for a breach to occur before designing and...more

DHS official warns of increase in cyberattacks of industrial control systems

Marty Edwards, head of the Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), recently warned attendees at a conference that ICS-CERT, (which assists U.S. businesses in...more

The CFTC’s Proposed Standards Identify Cybersecurity Best Practices

The Commodity Futures Trading Commission (CFTC) offered several reasons for proposing five new cybersecurity testing requirements for the commodity trading platforms it regulates in its December 23, 2015, Notice of Proposed...more

BIMCO issues cybersecurity guidelines for ships

Last week, BIMCO, along with other shipping organizations, “launched” guidelines “to help the global shipping industry prevent major safety, environmental and commercial issues that could result from a cyber incident on-board...more

Privacy Tip #18 – Beware of phishing expeditions

So I have been in the data privacy and security world for the past 16 years, and I am still amazed at how savvy hacksters are, and how vulnerable we are to their antics. And…how much havoc they can wreak personally and to our...more

[Webinar] Safeguarding Trade Secrets and Confidential Information: Top Ways to Mitigate Risks - Jan. 26, 11:00am EST

Did you know that insiders are most likely to steal confidential corporate information? And according to PwC’s Global State of Information Security Survey (2015): - As many as 71% of data security compromises go...more

Director Cybersecurity Risk Oversight and Actions

This article begins by providing an overview of the duty of directors to oversee risk, including cybersecurity risk, in the cyberattack context and then outlines actions that board of directors are taking as reported by...more

Also In the News - Data, Privacy, & Security Practice Report - December 2015 #2

Harmonizing Cybersecurity And Trade Secret Protection – Many companies are investing heavily in cybersecurity and implementing a framework such as the Cybersecurity Framework from the National Institute of Standards and...more

733 Results
|
View per page
Page: of 30

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×