Cyber Threats

News & Analysis as of

The Connected Car and Keeping YOU in the Driver’s Seat

Remember KITT? KITT (the Knight Industries Two Thousand) was the self-directed, self-driving, supercomputer hero of the popular 1980s television show Knight Rider. Knight Rider was a science fiction fantasy profiling the “car...more

Jeep Hack Drives Cyber, Crisis, Liability and Supply Chain Coverage Issues

A recall notice to fix critical control software on 1.4 million vehicles should raise concerns for companies, brokers and insurers across several business lines. The vulnerability of vital control systems to a remote hacking...more

GAO Issues Report Citing Shortcomings In Federal Government Cybersecurity

On July 8, 2015, the Government Accountability Office (“GAO”) issued a report finding that agencies across the federal government continue to have shortcomings in preventing, detecting, and responding to cyber threats. The...more

Cybersecurity is once again a hot topic as Illinois undergoes PIPA update

Cybersecurity is a hot topic at both the state and federal level. Specifically, Illinois is in the process of amending its Personal Information Protection Act (“PIPA”). Illinois SB 1833 will amend PIPA by establishing more...more

Blog: NACD Suggests Questions For Boards To Ask Cybersecurity Officers

As reported in the WSJ, the National Association of Corporate Directors advises that boards ask their companies’ chief information security officers some pointed questions about cybersecurity risks. Often, boards just ask...more

Class Is in Session: The FTC Launches New Data Security Initiative

Why it matters - The Federal Trade Commission (FTC) kicked off a new educational initiative to provide guidance to businesses in the area of data security. Based on the lessons learned from more than 50 of the agency's...more

FFIEC Releases Cybersecurity Assessment Tool

Why it matters - As anticipated, the Federal Financial Institutions Examination Council (FFIEC) released its Cybersecurity Assessment Tool, providing a process for financial institutions' management to gauge their...more

FTC's New Consumer Data Security Guidance Offers Businesses Practical Tips

The Federal Trade Commission has issued new guidance on data security for companies that collect, store and use consumer information, gleaned from the more than 50 enforcement actions brought by the agency over the past...more

Commerce Dept. Reviewing Stakeholders' Cybersecurity Comments

The U.S. Department of Commerce’s Internet Policy Task Force (IPTF) is currently reviewing feedback collected in response to a Request for Public Comment on cyber threats facing the digital ecosystem and economy, with the...more

You Can’t Just WISPer – Employers Must Publish or Display Security Policies

WISP is the acronym for Written Information Security Policy. The information at issue is an individual’s personal information and identifiers, such as a Social Security number, driver’s license number, credit or debit card...more

Privacy Monday – July 2015

Welcome to the dog days of summer 2015. Three privacy & security bits and bytes to start your week (if you are reading this on vacation … good for you!) 1. ICYMI: Massive Data Breach at OPM Claims Victim — The Director...more

SEC Commissioner Urges Cooperation Between Regulators and Companies in Fight Against Cyber-Crime; Highlights SEC’s Recent Efforts

On June 25, 2015, Luis Aguilar, a Commissioner at the U.S. Securities and Exchange Commission (“SEC”), provided remarks at the SINET Innovation Summit. In his remarks, Commissioner Aguilar emphasized the need for the public...more

FFIEC Tool Helps You Assess Cyber Risk

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and...more

Reforming Trade Secret Protections in Japan

Theft of corporate trade secrets continues to dominate the headlines as news abounds of stories ranging from crippling cyber-attacks exposing confidential data to employees stealing trade secrets to share with competitors. ...more

Needed Now: Experienced and Talented Cybersecurity Professionals to Protect Government Data Systems

The announcement on June 4th of a massive cybersecurity attack that compromised data stored on Office of Personnel Management (OPM) systems for 4.2 million current and former federal employees is the most recent head-smacking...more

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

Gov. Dayton Signs 2015 Jobs and Energy Bill into Law

On Saturday, June 13, Governor Dayton signed the 2015 Jobs and Energy Bill into Law. The following amendments were made after the Governor’s veto: - New definitions for “propane,” “propane storage facility,” and...more

OCC Comptroller Discusses Emerging Payment Systems Technology and Cybersecurity, FFIEC Set to Release Cybersecurity Assessment...

On June 3, in prepared remarks delivered at the BITS Emerging Payments Forum, OCC Comptroller Thomas Curry advised that as financial institutions continue to develop payment systems, banks need better preparation for...more

The Intersection of Cyber and D&O Coverage [Video]

From the 2015 PLUS D&O Symposium session “Parting Shots: A Conversation with Industry Leaders,” moderator James Skarzynski (Skarzynski Black LLC) and panelists Dan Fortin (Berkshire Hathaway Specialty Insurance), Lisa Butera...more

World War C: Cyber Warfare

State-sponsored hacking occurs when a country funds cyber hacking organizations or groups in order to infiltrate a company’s or government’s cyber system for the sole purpose of stealing personal/sensitive information in the...more

The FFIEC Warns Financial Institutions of the Dangers of Cyberattacks Involving Destructive Malware

On March 30th, the Federal Financial Institutions Examination Council (FFIEC) issued two Joint Statements on behalf of its members to warn financial institutions about the threats posed to various credentials by cyberattacks...more

The DOJ Sets Out to Establish Standard for Data Security Incident Response and Preparation

Organizations face threats to their data from all fronts, from sophisticated external attacks by hackers to employee error (as the 2015 BakerHostetler Incident Response Report showed). Recognizing the prevalence of these...more

DHS Breaks New Ground With Issuance of SAFETY Act Certifications for Advanced Cybersecurity Defense Systems

FireEye’s MVX and DTI Technologies become the first cybersecurity products to earn certification as “Qualified Anti-Terrorism Technologies.” The Department of Homeland Security (DHS) crossed an important barrier in...more

79 Results
|
View per page
Page: of 4

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×