Cybersecurity Cyber Attacks

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

House Passes the National Cybersecurity Protection Advancement Act

Following Wednesday’s approval of the Protecting Cyber Networks Act (H.R.1560) (“PCNA”), the House of Representatives passed the National Cybersecurity Protection Advancement Act (H.R. 1731) (“NCPAA”) on Thursday, a move...more

Cyber-Attacks, and the Seven Steps to Protect Your Advisory Business Against Them

It sounds futuristic, or like CSI: Cyber, a sci-fi world of white hat/ black hat hackers, and of constant threats to national security and the financial markets caused by the digital world we live in. Based on the latest SEC...more

House Passes New Cybersecurity Legislation Amidst Growing Pressure from Industry

The House of Representatives passed the Protecting Cyber Networks Act (H.R.1560) (“PCNA”) yesterday, amidst growing pressure from industry to enact legislation that would help companies harden key infrastructure and respond...more

FCC Chairman Tom Wheeler Speaks about Cybersecurity at RSA Conference

As cyber week continues in Washington, Federal Communications Commission Chairman Tom Wheeler traveled to the west coast to speak about cybersecurity at the RSA Conference in San Francisco. Wheeler noted that the FCC has...more

Virginia Launches First State-Level Information Sharing and Analysis Organization

On April 20, Virginia Gov. Terry McAuliffe announced that the state is establishing the nation’s first state-level Information Sharing and Analysis Organization (“ISAO”), intended to enhance the voluntary sharing of critical...more

President Issues Executive Order to Block Assets of Foreign Cyber Attackers

President Obama recently issued Executive Order 13694 (EO 13694 or EO), “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities.” EO 13694 is aimed at deterring cyber attacks,...more

United States Goes on the Offensive Against International Cybercrime - 2015 Cybersecurity Executive Order

On April 1, President Obama signed an Executive Order to combat the "national emergency" sparked by a rapidly evolving global cybercrime environment. The Executive Order directs the U.S. Treasury Department to impose...more

Privacy Tuesday – April 2015 #2

Spring has finally arrived on the East Coast, and not a moment too soon. Here are 3 privacy & security bits and bytes to start your week....more

White House Issues Executive Order To Combat Against Cyber Attacks

On April 1, President Obama issued an executive order granting the Department of Treasury new authority to impose sanctions against individuals or entities that engage in activities which benefit from cyber attacks against...more

Cyber Incident/Data Breach Response: Your emergency Checklist

The first 24 hours after you discover a data breach are critical to restoring security, minimising harm, obtaining and preserving evidence and complying with contractual and legal obligations. This Emergency Checklist...more

FFIEC Releases Statements on How Financial Institutions Can Identify and Mitigate Cyber Attacks

On March 30, the FFIEC announced two separate statements regarding cyber attacks at financial institutions: Statement on Destructive Malware and Statement on Compromising Credentials. The statements come in light of the...more

"President Obama Announces New Cybersecurity Sanctions Regime"

On April 1, 2015, President Barack Obama issued an executive order (the Order) authorizing sanctions against foreign individuals or entities found to be responsible for certain malicious cyberattacks. Under the Order, the...more

President Obama Signs Executive Order Authorizing Sanctions In Response To Malicious Cyber Activity

On April 1, 2015, President Obama signed an executive order authorizing the first sanctions program to combat malicious cyber activity. The order permits the U.S. Department of the Treasury to freeze the assets of...more

Obama Executive Order Targets International Cyberattacks Against U.S. with New Sanctions

As part of a series of measures aimed at increasing preparedness and defenses against international cyberattacks on U.S. industries and government agencies, on April 1, President Obama issued Executive Order No. 13694,...more

Now's the Time to Review Your OFAC Compliance Program

Obama Executive Order Targets International Cyberattacks Against U.S. with New Sanctions - New Sanctions Are Part of U.S. Escalation of Efforts to Bolster Cyber-Security: As part of a series of measures aimed at...more

President Obama Issues New Executive Order Authorizing Sanctions Against Cyber Attackers

President Obama issued an Executive Order (the “Order”) on April 1, 2015 that authorizes financial sanctions against certain “persons” (including both individuals and entities) designated by the Treasury Secretary to be...more

Executive Order Creates Cybersecurity Sanctions Framework

On April 1, 2015, President Obama issued an Executive Order authorizing the imposition of sanctions against designated individuals or entities found to be engaged in malicious cyber activity, including various forms of...more

Obama Signs Executive Order Establishing Cybersecurity Sanctions Regime

On April 1, 2015, President Obama signed an executive order establishing a new sanctions program targeting individuals and entities responsible for, or complicit in, cyber-enabled activities that threaten the national...more

Effective cybersecurity: 8 questions for you and your team

Cybersecurity has become a top-tier risk for US and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed,...more

Cyber Vulnerability in Wind Turbines

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to a software bug, an attacker can get the user name and password from the browser. This can allow admin...more

Cyberspy thriller with an unclear ending

It reads more like a spy thriller than a news story. Employees of the U.S. subsidiary of a global technology and media company log on to their computers one Monday morning and are greeted with the menacing figure of a neon...more

The Auto Industry: The Next "Big" Target for Hackers?

Given the exponential rise in security breaches and hacking activity in past few years and the almost constant headlines in the press of yet another major security breach, information security should be a front burner issue...more

[Event] March Madness: Cyber Liability & Mitigating Risk - Mar. 19, San Diego, CA

The stakes are getting higher regarding cybersecurity. However, there are several steps organizations can take to protect against cybersecurity data breaches. Further, taking these steps can protect companies in the context...more

Anthem Data Breach Requires Plan Sponsor Attention

On January 29, 2015, Anthem Inc., one of the largest managed health care companies in the country, disclosed that the sensitive personal data of almost 80 million current and former participants in its network was breached in...more

BSA Releases European Union Cybersecurity Dashboard

On March 3, BSA/The Software Alliance, a software industry advocacy group, released the EU Cybersecurity Dashboard: A Path to a Secure European Cyberspace (the “EU Dashboard”), an analysis of data security laws and policies...more

250 Results
|
View per page
Page: of 10

All the intelligence you need, in one easy email:

Great! Your first step to building an email digest of JD Supra authors and topics. Log in with LinkedIn so we can start sending your digest...

Sign up for your custom alerts now, using LinkedIn ›

* With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name.
×