Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

IRS Data Breach Highlights the Growing Threat of Cybercrime

On May 26, 2015, the IRS announced that hackers had gained access to over 100,000 tax accounts. The data breach involved the “Get Transcript” application, which allows individuals to request transcripts of their past tax...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Expect Focus - ONLINE HEALTH CARE: NOT SO FAST Telemedicine Hits A Few Speed Bumps, Volume II, Spring 2015

In This Issue: - IN THE SPOTLIGHT • Risky Business: Common Cyber Security Risks, Expensive Consequences - LIFE INSURANCE • Ninth Circuit Finds Bonus Indexed Annuity Delivers Exactly...more

FIN4 May Have Embarked on a Risky Hacking/Insider Trading Strategy

I haven’t yet turned to a life of crime, so far be it from me to criticize actual criminals’ profit-maximizing strategies. It’s easy for me to nitpick, but I’m not the one strapping on my mask and trying to earn a...more

Connecticut Governor Signs Cybersecurity Study Act

Wednesday, Connecticut Governor Dannel Malloy signed Special Act No. 15-13, effective immediately, which requires the Connecticut Department of Administrative Services, in consultation with the Department of Emergency...more

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance

The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Financial Services Weekly News Roundup - June 2015 #4

Regulatory Developments - Client Alert: SEC Proposes Pay for Performance Rules: Goodwin Procter’s Capital Markets practice has issued a Client Alert on the SEC’s proposed rule that would require most public...more

Focus on China Compliance - June 2015

In This Issue: - Increased Scrutiny by Chinese Securities Regulators Will Have Global Implications - Effective Employee Suspension Agreements to Facilitate Compliance Investigations - Protecting Against...more

Antitrust Law Issues for Health Care Providers [Video]

During this webinar, panelists examined recent developments in antitrust law and discuss the potential impact on health care providers. Key topics included: • Trends in health care competition after the ACA, with a focus...more

Even Small Businesses Need To Pay Attention To Data Security

When people think about data breaches, corporate giants like Target, Home Depot and Michael’s spring to mind. But even small businesses holding personal information can face costly consequences if a breach occurs. In the...more

Is Your Financial Institution the Next Target of a Cyber-Attack? [Video]

Not worried about cybersecurity at your financial institution? Then you are in the minority. Cyber-risk was identified as the number one worry of bank risk managers at a panel of bank chief risk officers at the American...more

1f You Can R3ad Th15 – Security and Scam Alert

You may think there is no value in chasing domain name squatters because customers find your website through search engines, but consider squatters as internal and external security risks. A constantly evolving threat, there...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

NYDFS Report Foreshadows New Cyber Security Regulations

The New York State Department of Financial Services (NYDFS) has released a report entitled "Update on Cyber Security in the Banking Sector: Third Party Service Providers." The report details the findings of an October, 2014...more

RadioShack’s Consumer Data: A Highly Scrutinized Asset

Following the Texas Attorney General’s objection to the sale of RadioShack Corporation’s consumer data as an asset in its bankruptcy, 37 other state attorneys general and a large number of other consumer protection entities...more

Is Your Financial Institution the Next Target of a Cyber-Attack?

In This Presentation: - Regulatory expectations for financial institutions - Risks for financial institutions - Planning to reduce risks - The Breach - Duties and responsibilities -...more

That is SO last week - June 2015 #2

Over the past couple of weeks, payroll giant ADP and successful HR startup Zenefits got into what The Starr Conspiracy has called a “kerfuffle” over Zenefits’ use of ADP’s employer data and millions of employees’ personal...more

Cyber Security - Risk Management and Mitigation

In This Issue: - Agenda - Current Threat Environment - Current Threat Environment - Strategic Importance - Asian Data Privacy Regimes At-A-Glance - Data Protection: Regional temp - Asia-Pacific...more

That is SO last week - June 2015

Last week, Uber suffered a setback in one of the many driver-initiated lawsuits it’s defending. A federal judge in California ruled that the popular ride-sharing app cannot compel arbitration of claims by drivers relating to...more

Privacy Tuesday – June 2015

It’s appropriate that the “boys of summer” feature prominently in today’s post. Strike three for the St. Louis Cardinals? On another summer Privacy Monday in 2014, we made note of a reported hack into the Houston...more

Cybersecurity: Where Does the Buck Stop?

Over the last few months, we’ve been talking about cybersecurity issues for employers. We’ve discussed the responsibilities and risks associated with personally identifiable information and the wave of lawsuits resulting...more

1,861 Results
|
View per page
Page: of 75

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×