Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Where Are We Now? The NIST Cybersecurity Framework One Year Later

The National Institute of Standards and Technology (NIST) released its Cybersecurity Framework (Framework) almost 15 months ago and charged critical infrastructure companies within the United States to improve their...more

DOJ Cybersecurity Unit Releases “Best Practices” For Cyber Breaches

Last week, in conjunction with the Criminal Division’s Cybersecurity Industry Roundtable, the U.S. Department of Justice released its “Best Practices” guide for preparing for and responding to a cyber incident....more

Executive Order Authorizes Sanctions against Cybercriminals

Citing cyberthreats as one of the most serious economic and national security challenges to the U.S., President Obama recently issued an executive order (EO) authorizing the use of economic sanctions against those who...more

Revised Guidance for Privacy and Security of Electronic Health Information Released by Government

The Office of the National Coordinator for Health Information Technology (“ONC”) has released a revised Guide to Privacy and Security of Electronic Health Information (the “Guide”), which is intended to be a resource for...more

Taking Control of Cybersecurity: A Practical Guide for Officers and Directors

Major cybersecurity attacks of increased sophistication — and calculated to maximize the reputational and financial damage caused to the corporate targets — are now commonplace. These attacks have catapulted cybersecurity to...more

Bridging the Week - May 2015

CME Group Summarily Suspends Trading Privileges of Two Traders Without Hearing for Alleged Spoofing and Non-Cooperation - Less than two weeks after civil and criminal charges were filed by the Commodity Futures Trading...more

Locke Lord QuickStudy: Investment Advisers Should “Beef Up” Cybersecurity Strategies - SEC Issues Updated Guidance

Registered investment advisers should periodically assess their cybersecurity vulnerabilities, create strategies to respond, and make sure they are making the strategies work. ...more

DOJ Issues Best Practices For Data Breach Response

On Wednesday, April 29, 2015, the Department of Justice Computer Crime & Intellectual Property Section (CCIPS) Cybersecurity Unit issued guidance on best practices for responding to data breaches. DOJ released its “Best...more

New Cyber Strategy Issued By Pentagon

In a speech at Stanford University on April 23, 2015, Department of Defense (“DoD” or the “Pentagon”) Secretary Ash Carter unveiled the Pentagon’s new cyber strategy (the “Strategy”) and called on the technology sector to...more

SEC Issues Cybersecurity Guidance for Registered Investment Advisers and Registered Funds

The SEC’s Division of Investment Management issued guidance highlighting the importance of cybersecurity and discussing measures that registered investment companies (“funds”) and registered investment advisers (“advisers”)...more

Department of Justice Issues Best Practices Guidance on Cyber Incidents

On Wednesday, April 29, the US Department of Justice released guidance titled “Best Practices for Victim Response and Reporting of Cyber Incidents.” The guidance outlines steps companies should take before, during, and after...more

SEC Releases Cybersecurity Guidance, Highlights Compliance Role

The SEC’s Division of Investment Management recently released cybersecurity guidance highlighting best practices and warning that cybersecurity breaches and deficiencies in cybersecurity programs could cause funds and...more

Popular Reads on JD Supra: Cybersecurity, H-1B Visas, Social Media in Hiring, and More

To H-1B or not to H-1B, that was the big question this past month on JD Supra, but certainly not the only question on the minds of our readers. ...more

Weekly Update Newsletter - May 2015

SMALL BUSINESS ADMINISTRATION - SBA Issues Proposed Rule to Amend Women-Owned Small Business Federal Contract Program - The U.S. Small Business Administration (SBA) issued a proposed rule to amend its...more

SEC Staff Issues Update Guidance Regarding Cybersecurity

Recently, the Staff of the Division of Investment Management of the Securities and Exchange Commission (the “Staff”) issued updated Guidance that highlights the importance of cybersecurity of registered investment funds and...more

New Guidance from the SEC: Cyber Security Best Practices

On April 28, 2015, the U.S. Securities and Exchange Commission’s Division of Investment Management (the “Division”) issued a Guidance Update to investment and fund advisers on the topic of improving cyber security. While it...more

NAIC Adopts Cybersecurity Regulatory Principles – What’s Important to the Regulators

File this under: A View Into What the Regulators Deem Important. The National Association of Insurance Commissioners (NAIC), the standard-setting organization in the U.S. insurance industry created and governed by the chief...more

SEC Updates Guidance on Cybersecurity

Emphasizing the critical importance of cybersecurity to registered investment companies (RICs), including insurance separate accounts and business development companies, and to investment advisers, the SEC’s Division of...more

Privacy & Cybersecurity Update - April 2015

In This Issue: - DOJ Issues Cyber Preparation and Response Guidance - RadioShack’s Plan to Auction Customer Data Highlights Issues Over Treatment of Such Data as an Asset - Google v. Vidal-Hall and...more

Cybersecurity Legislation Passes In The House

As an update to last week’s article, Congress To Take Up Major Cybersecurity Legislation During “Cyber Week”, the House passed H.R. 1560 and H.R. 1731. These Acts will now be combined and sent as a package to the Senate....more

EUROPE: Security and privacy must go hand in hand, not head-to-head, says European Privacy Supervisor

At a 29 April Cybersecurity and Privacy conference in Brussels, Keynote Speaker and recently appointed European Data Protection Supervisor (EDPS) Giovanni Buttarelli was given the opportunity to comment on his 5-year...more

IREG Update

Cybersecurity and the Insurance industry - Cybersecurity is quickly emerging as a top policy issue for insurance regulators. Speaking at a Dow Jones Risk & Compliance forum last week, on April 21, 2015, New York...more

Addressing Cybersecurity Oversight in Audit Committee Charters

Cybersecurity continues to emerge as a key risk that is attracting the attention of regulators and boards of directors. Companies take different approaches regarding how the board fulfills its oversight duty with respect to...more

Planning for Breach Notification Requirements in Your Customer Contracts

At the San Francisco “Exchange” Data Privacy and Cyber Security Forum on April 26, a spirited debate arose whether a federal breach notification law will/should be enacted to bring uniformity to the patchwork of breach...more

SEC Issues New Cybersecurity Guidance for Investment Funds

On April 28, the Securities and Exchange Commission (SEC) Division of Investment Management (the “Division”) published a Guidance Update setting forth cybersecurity concerns and advice for the registered investment ...more

1,687 Results
|
View per page
Page: of 68

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×