Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

New Case Highlights Deep Hole in Cyber Insurance Policies

Insurance policies covering data breach liability began appearing roughly ten years ago. We noted then a troublesome provision in some forms that seemed to exclude coverage for the insured’s failure to maintain data security...more

IEEE Releases Med Device Cybersecurity Guidelines

Amid myriad media reports about potential vulnerabilities in medical device cybersecurity and the FDA’s efforts to strengthen medical device cybersecurity, the IEEE Cybersecurity Initiative released a report entitled...more

Bridging the Week - June 2015 #5

UK Regulators Implement Tougher Pay Rules for Banking Institutions’ Senior Managers: The United Kingdom Prudential Regulation Authority and Financial Conduct Authority have adopted new rules regarding the remuneration of...more

How to Protect Your Company’s Bottom Line Against Data Breach Losses Through Insurance

In the wake of what seems to be daily announcements of new data security breaches and increased regulatory oversight over company information security and privacy practices, companies are looking for ways to minimize risks...more

Cyber risks -- Congressional Letter to SEC

On June 18, 2015, Congressmen Jim Langevin (D-RI) and Jim Himes (D-CT) sent a letter to the Securities and Exchange Commission (SEC) calling for updated cybersecurity disclosure guidance for publicly traded companies....more

Cybersecurity for Contractors and Design Professionals

Data breaches and the resulting havoc for companies that must deal with them are all over the news. While most construction industry businesses do not handle large amounts of consumer data, you cannot simply ignore...more

State Breach Notification Laws Continue To Change

State breach notification laws continue to be amended to (1) provide for notification of a state attorney general or regulator about a breach in addition to affected individuals, (2) cover breaches involving personal...more

IRS Data Breach Highlights the Growing Threat of Cybercrime

On May 26, 2015, the IRS announced that hackers had gained access to over 100,000 tax accounts. The data breach involved the “Get Transcript” application, which allows individuals to request transcripts of their past tax...more

Digital Disruption When You Least Expect (Or Want) It

In this Presentation: - Introduction - Chocolate, Cookies, Coffee and Biscuits - Privacy, Legislation, Underworld behaviour - Even manufacturers have secrets to protect! - Invention, 1%’ers and...more

Expect Focus - ONLINE HEALTH CARE: NOT SO FAST Telemedicine Hits A Few Speed Bumps, Volume II, Spring 2015

In This Issue: - IN THE SPOTLIGHT • Risky Business: Common Cyber Security Risks, Expensive Consequences - LIFE INSURANCE • Ninth Circuit Finds Bonus Indexed Annuity Delivers Exactly...more

FIN4 May Have Embarked on a Risky Hacking/Insider Trading Strategy

I haven’t yet turned to a life of crime, so far be it from me to criticize actual criminals’ profit-maximizing strategies. It’s easy for me to nitpick, but I’m not the one strapping on my mask and trying to earn a...more

Connecticut Governor Signs Cybersecurity Study Act

Wednesday, Connecticut Governor Dannel Malloy signed Special Act No. 15-13, effective immediately, which requires the Connecticut Department of Administrative Services, in consultation with the Department of Emergency...more

Laws Governing Data Security and Privacy – U.S. Jurisdictions at a Glance

The below chart constitutes a summary of the laws of various jurisdictions that govern data breach notifications...more

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

Internet Of Things, News Websites Fare Poorly In Security And Privacy Review

On June 16, the Online Trust Alliance, an industry group focused on developing and encouraging best practices in online security and privacy, announced that a recent audit of approximately 1,000 websites showed that 46%...more

Financial Services Weekly News Roundup - June 2015 #4

Regulatory Developments - Client Alert: SEC Proposes Pay for Performance Rules: Goodwin Procter’s Capital Markets practice has issued a Client Alert on the SEC’s proposed rule that would require most public...more

Focus on China Compliance - June 2015

In This Issue: - Increased Scrutiny by Chinese Securities Regulators Will Have Global Implications - Effective Employee Suspension Agreements to Facilitate Compliance Investigations - Protecting Against...more

Antitrust Law Issues for Health Care Providers [Video]

During this webinar, panelists examined recent developments in antitrust law and discuss the potential impact on health care providers. Key topics included: • Trends in health care competition after the ACA, with a focus...more

Even Small Businesses Need To Pay Attention To Data Security

When people think about data breaches, corporate giants like Target, Home Depot and Michael’s spring to mind. But even small businesses holding personal information can face costly consequences if a breach occurs. In the...more

Is Your Financial Institution the Next Target of a Cyber-Attack? [Video]

Not worried about cybersecurity at your financial institution? Then you are in the minority. Cyber-risk was identified as the number one worry of bank risk managers at a panel of bank chief risk officers at the American...more

1f You Can R3ad Th15 – Security and Scam Alert

You may think there is no value in chasing domain name squatters because customers find your website through search engines, but consider squatters as internal and external security risks. A constantly evolving threat, there...more

ALERT: NIST Issues Final Guidance on Federal Contractor Cybersecurity Standards for Controlled Unclassified Information

On June 19, 2015, the National Institute of Standards and Technology (NIST) published the final version of guidance for federal agencies to ensure sensitive information remains confidential when stored outside of federal...more

How Businesses Can Reduce Cyber Risk: Pre and Post Incident: Businesses Need to Take a More Proactive Approach to Reducing What Is...

As the volume of sensitive data that businesses store ever increases, the use of mobile devices continues to grow and cyber villains become ever more sophisticated, it is perhaps of no surprise that we hear about new...more

Cyber-Attacks: Threats, Regulatory Reaction and Practical Proactive Measures to Help Avoid Risks

I. Cybersecurity; Its Importance and Relevance – How We Got to Where We Are Today - In the past few months, the White House, Home Depot, JP Morgan, Hard Rock Hotels, Tesla, the St. Louis Federal Reserve, the Internal...more

NYDFS Report Foreshadows New Cyber Security Regulations

The New York State Department of Financial Services (NYDFS) has released a report entitled "Update on Cyber Security in the Banking Sector: Third Party Service Providers." The report details the findings of an October, 2014...more

1,868 Results
|
View per page
Page: of 75

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×