In this Presentation:
- Internet of Things - definition
- But what is it all about?
- But not just that...
- The IoT market in figures...
- Beecham Research - view of the World
- The Connected...more
In a recent speech at the Georgetown Cyber Security Law Institute, Assistant Attorney General Leslie Caldwell outlined the recent activities of a new Cyber Security Unit created within the Justice Department’s Computer Crime...more
“No,” says U.S. Assistant Attorney General Leslie R. Caldwell. At the most recent Cybersecurity Law Institute held at Georgetown University Law Center in late May, the head of the U.S. Department of Justice’s (DOJ) Criminal...more
In This Issue:
- Second Circuit Rules Patriot Act Does Not Authorize Bulk Metadata Collection; Congress Reconsiders Certain Patriot Act Authorities
- SEC Issues Cybersecurity Guidance for Investment Companies...more
In the immediate aftermath of a major security or data breach companies should re-evaluate their risk management systems. In a previous post on insider threats, we outline what a company can do to prevent risks associated...more
Security experts are warning that 2015 is the “Year of the Healthcare Hack” as media outlets continue to report on a number of high-profile companies that have recently experienced attacks by cybercriminals seeking valuable...more
On April 29, 2015, the Cybersecurity Unit in the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice released a best practices document (Document) for victims of cyber incidents. The...more
The new sanctions in President Barack Obama’s Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,” target individuals and...more
By some estimates, cybercrime costs the global economy $445 billion annually. If cybercrime were a single country, this dollar amount would place it within the world’s top 30 countries in terms of gross domestic product, and...more
With each passing year, cybercrime moves further into the mainstream of public company existence. What until recently was mostly an annoying, abstract concern for a handful of companies is now a daily menace that impacts...more
President Obama recently issued Executive Order 13694 (EO 13694 or EO), “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities.” EO 13694 is aimed at deterring cyber attacks,...more
On April 1, President Obama signed an Executive Order to combat the "national emergency" sparked by a rapidly evolving global cybercrime environment. The Executive Order directs the U.S. Treasury Department to impose...more
IBM researchers reported late last week that they have identified an increase in the use of Dyre Wolf malware which has contributed to the loss of millions of dollars from victim companies. Dyre Wolf allows the intruders to...more
The executive order enables US government agencies to block the assets of any foreign person determined to have engaged in malicious cyber-enabled activities....more
Having strong cybersecurity policies is critical for protecting a company's business, as the amount of commerce conducted over networks and the Internet increases each year. Last month the Congressional Research Service...more
In response to the growing cyber security threats from outside of the United States, the U.S. Government has added an entire new category of sanctioned individuals and organizations to its list of Specially Designated...more
While it’s not clear whether the President’s release today of an Executive Order, "Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities," was purposefully timed to coincide with...more
Obama administration proposal would reduce legal ambiguities and allow civil RICO claims.
On January 2015, the Obama administration announced a series of proposals to strengthen the country’s response to...more
This marks the inaugural “Five Minutes With” feature that Trade Secrets Watch will run occasionally. These will be question-and-answers with notable figures in the trade secrets world. TSW got a chance to sit down with UC...more
The Article 29 Data Protection Working Party (Working Party) sent a letter to the Council of Europe discussing its first assessment of several cybercrime scenarios presented at the 2014 Cybercrime@Octopus conference...more
FBI Director Comey delivered a keynote speech at the annual International Conference on Cyber Security this past Wednesday at Fordham University. In his speech, Director Comey discussed a number of organizational changes over...more
Cybersecurity breaches made headlines in 2014, but how troubling is it? Very, according to findings recently published by PricewaterhouseCoopers LLP (PwC).
According to PwC’s research, global cybersecurity incidents...more
Symantec Corporation, the data security software provider, filed a motion to quash the plaintiffs’ third-party subpoena in the consolidated class action over Target Corporation’s massive customer data breach in late 2013. ...more
On December 4, Assistant AG Leslie Caldwell delivered remarks at the Cybercrime 2020 Symposium regarding the DOJ’s recent efforts to fight cybercrime. Specifically, Caldwell noted the DOJ’s Criminal Division is (i) increasing...more
IN THIS ISSUE:
BSA/AML & OFAC | Virtual Currency & Payment Systems | FCPA & Anti-Corruption | Criminal Enforcement.
Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up to create your digest using LinkedIn*
Back to Top