Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Financial Services Weekly News - February 2015

Regulatory Developments - FDIC Provides Framework for Cybersecurity in Recent Supervisory Insights - The FDIC featured an article titled “A Framework for Cybersecurity” in the Winter 2015 issue of Supervisory...more

FinCEN to Financial Institutions: Include Cyber Data in Suspicious Activity Reports (SARs)

As new legislation aimed at facilitating greater cybersecurity information sharing between private industry and government takes effect (i.e., Cybersecurity Information Sharing Act), FinCEN Director Jennifer Shasky Calvery...more

Tearing Down the Silos

AML and cybersecurity teams must discover what they have in common, identify mutual strengths and weaknesses, and move toward an effective fusion of functions, processes, and mindsets. ...more

Will Wearable Technology Be a Boost To Enterprise Security?

Shiran Kleiderman of K2 Intelligence looks at how wearable technology and the Internet of Things can help boost enterprise security, when done right...more

Regulatory And Litigation Hot Topics For Private Funds In 2016

Private investment funds are likely to face increased regulatory scrutiny and litigation risk in 2016, not only based on the Securities and Exchange Commission’s focus on the industry but also due to transparency and...more

#LTNY16: That’s a Wrap!

Whew! After three electrifying (and tiring) days, Legal Tech New York 2016 is in the books! For those of you that experienced the show first-hand, we don’t have to tell you that this year’s conference was another...more

Preparation for 2015 Fiscal Year-End SEC Filings and 2016 Annual Shareholder Meetings

As our clients and friends know, each year Mintz Levin provides an analysis of the regulatory developments that impact public companies as they prepare for their fiscal year-end filings with the Securities and Exchange...more

Securities Enforcement 2015 Year-End Review

The Securities and Exchange Commission (the SEC or the Commission) filed a record 807 enforcement actions in fiscal year 2015, 52 more than it filed in 2014. It also set a record by obtaining approximately $4.2 billion in...more

Government Contractors Brace For Continuing Changes in Cybersecurity Regulations

The federal government has responded to recent data breaches by making cybersecurity a top priority, and it continues to consider and implement a number of regulations that affect government contractors. Over the past...more

The Cybersecurity Act Of 2015

On December 18, 2015, the President signed into law the Cybersecurity Act of 2015 ("the Act"). The intent of the Act is to encourage more interaction between the government and the private sector, as well as within the...more

FDA Regulatory and Compliance Monthly Recap — January 2016

OPDP enforcement reaches record low in 2015 as drugmakers face uncertainty in digital marketing - Enforcement by the OPDP has fallen notably since 2010. The decline has been attributed, in part, to the agency's slow...more

The Cybersecurity Act of 2015: Implications for Threat Sharing

On December 18, 2015, President Obama signed the Cybersecurity Act of 2015 (The “Act”), legislation designed to combat online threats to the federal government, state and local governments, and private entities. Within the...more

Postmarket Cybersecurity Recommendations for Medical Devices Issued by the FDA

We’ve blogged about medical device cybersecurity topics. The topic is in the news yet again with the FDA issuing a draft guidance outlining postmarket recommendations for medical device manufacturers to address cybersecurity...more

FDA Issues New Draft Guidance on Postmarket Cybersecurity for Medical Devices

The new Draft Guidance is one of a string of recent actions taken by FDA to address overall medical device cybersecurity. Recognizing the growing importance of cybersecurity for medical devices and the potential public...more

Hedge Fund Standards Board Publishes Findings From First Cyber-Attack Simulation

On January 21, the Hedge Fund Standards Board (HFSB) released the results of its first cyber-attack simulation (via a press release dated January 19)....more

Cyber Insurance: Caveat Emptor

Much has been written about the increasing prevalence of, and need for, cyber insurance. At the same time, it is important that policyholders or prospective purchasers of cyber insurance keep their eyes open. Ultimately,...more

FDA Issues Postmarket Cybersecurity Recommendations for Medical Devices

On January 22, 2016, the federal Food and Drug Administration (“FDA”) issued a draft guidance outlining postmarket recommendations for medical device manufacturers to address cybersecurity risks. The draft guidance details...more

FDA Recommends Medical Device Manufacturers Implement a Comprehensive Cybersecurity Risk Management Program in Accordance with...

Medical devices increasingly contain software or connect to networks that may leave the devices vulnerable to cyber-attacks. The U.S. Food and Drug Administration (“FDA”) has recognized the potential risks that these...more

FDA's Expanding Views on Cybersecurity and Medical Devices: Draft Guidance on Postmarket Management of Cybersecurity

Medical device manufacturers need to consider cybersecurity controls in all aspects of the product development process, from conception through commercialization. In response to concerns about increased cybersecurity...more

A Compilation of Enforcement and Non-Enforcement Actions

Non-Enforcement - FINRA’s Proposed Pay-to-Play Rule Will Impact Investment Advisers - Late last year (December 24, 2015), the Financial Industry Regulatory Authority (FINRA) submitted a proposed rule to the U.S....more

FDA Releases Draft Guidance for Medical Device Cybersecurity

It seems that everything in our life is getting connected to the Internet. We now live in an age where household items like refrigerators have Internet-connected LCD screens and privacy experts talk about the so-called...more

Food And Drug Administration Issues Draft Guidance On Cybersecurity In Medical Devices

On January 22, 2016, the Food and Drug Administration (“FDA”) released draft guidance regarding postmarket management of cybersecurity risks in medial devices. This guidance comes over a year after the FDA issued similar...more

Washington Healthcare Update

This Week: Because of the Blizzard of 2016—also known as “Snowzilla”—in Washington, D.C., and other parts of the East Coast, this is a combined issue... The House of Representatives opted not to come back to town until next...more

Alert: FCC Proposes Cybersecurity Requirements for Broadcasters and MVPDs

The Federal Communications Commission has proposed rules requiring all participants in the nation's emergency alert system ("EAS") to implement certain cybersecurity risk management practices. The proposed rules could apply...more

FDA applies postmarketing requirements to evolving medical device cyber-risks – key messages to manufacturers

With incursions on cybersecurity occurring daily across a variety of platforms, cybersecurity risks are top of mind for FDA and for the device industry....more

2,765 Results
|
View per page
Page: of 111

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×