News & Analysis as of

Cybersecurity Data Protection Data Security

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -
Cozen O'Connor

PA AG Launches Online Portal for Data Breach Reporting

Cozen O'Connor on

Pennsylvania AG Michelle Henry announced the launch of an online portal to report data breaches ahead of the effective date of recent amendments to Pennsylvania’s Breach of Personal Information Notification Act (BPINA)....more

Osano

All About the Rhode Island Data Transparency and Privacy Protection Act (RIDTPPA)

Osano on

Starting January 1, 2026, businesses operating in Rhode Island will need to comply with the Rhode Island Data Transparency and Privacy Protection Act, a mouthful of a law abbreviated as RIDTPPA. (Not exactly catchy, is it?)...more

Woodruff Sawyer

Healthcare’s Ever-Evolving Privacy Landscape: Litigation, Regulation, and the Perpetual Data Breach Risk

Woodruff Sawyer on

This webinar focuses on the privacy, security, regulatory, and litigation landscape that the healthcare sector is facing in in the privacy and cybersecurity arena. Leveraging Polsinelli’s experience working with healthcare...more

Osano

When AI Meets PI: Assessing and Governing AI from a Privacy Perspective

Osano on

No doubt about it, artificial intelligence is here to stay. We are getting past the hype and starting to see how organizations are adopting AI. Even cautious groups who have taken a "wait and see" approach are beginning to...more

Miller Nash LLP

The State of State Privacy Laws: What Businesses Need to Know (2024 Edition)

Miller Nash LLP on

Summer days are over and it’s time to hit the books. State legislatures were just as busy in 2024 as they were in 2023 making up for the U.S. Congress’s inability to pass a comprehensive privacy law....more

Bond Schoeneck & King PLLC

Data Privacy and Security Concerns for Businesses in the Hospitality and Tourism Markets

Hospitality and tourism is a broad and varied industry that can encompass hotels, restaurants, bars, casinos, theme parks, wineries, breweries, distilleries and more. While these businesses all have very different methods of...more

EDRM - Electronic Discovery Reference Model

[Webinar] Data Risk & Resilience Part III - Digital Forensics in your Incident Response Plan - September 19th, 1:00 pm - 2:00 pm...

Data Resilience Masterclass: Navigating the Risks of the Digital Age - Data Risk and Resilience is a critical topic for modern businesses, especially within industries that handle vast amounts of sensitive information....more

Seyfarth Shaw LLP

Careful Data Governance Is a Must Amid Enforcement Focus

Seyfarth Shaw LLP on

Corporations face unprecedented challenges in safeguarding sensitive data and mitigating privacy risks in an era marked by the rapid proliferation of Internet of Things, or IoT, devices....more

Dechert LLP

Dechert Cyber Bits - Issue 61

Dechert LLP on

X Agrees to Stop Processing EU Data to Train its Grok AI - Ireland’s Data Protection Commission (“DPC”) recently filed an urgent High Court application against X (formerly Twitter) for using the personal data of European...more

Association of Certified E-Discovery...

[Webinar] Digital Forensics in your Incident Response Plan - September 26th, 10:00 am PDT

Organizations face increasingly sophisticated threats that can compromise data and disrupt business operations. This presentation will explore the role that digital forensics plays in an effective incident response plan using...more

Woodruff Sawyer

How to Hire a CISO as Scrutiny Intensifies

Woodruff Sawyer on

The role of the chief information security officer (CISO) in 2024  is evolving. With budgetary limitations, an increasingly complex threat environment, generative artificial intelligence (AI) tools, new regulatory mandates, a...more

J.S. Held

Benefits of a vCISO in the Age of AI-Driven Cyberattacks

J.S. Held on

Cyberattacks powered by artificial intelligence have become more sophisticated as bad actors utilize machine learning to analyze vulnerabilities, automate exploits, and outpace traditional security measures. Through the use...more

Hogan Lovells

The Protection of Critical Infrastructure (Computer System) Bill: Hong Kong’s first specific cybersecurity legislation

Hogan Lovells on

In late June 2024, the Security Bureau of the Hong Kong SAR Government (the “Government”) proposed the first specific cybersecurity legislation in Hong Kong, tentatively entitled the Protection of Critical Infrastructure...more

Bradley Arant Boult Cummings LLP

Avoiding growing pains in the development and use of digital twins

Novel technologies that seek to improve quality of life or simplify complex processes offer great promise. For example, medical technologies that detect or cure disease or supply chain technologies that allow for real time...more

Miller Nash LLP

Back-to-School Compliance Checklist: Key Privacy & Data Security Considerations for Oregon K-12 Administrators

Miller Nash LLP on

Summer vacation is winding down and teachers and students will soon be returning to classrooms across Oregon. While teachers are freshening up their classrooms for the new school year, administrators should remember to...more

Society of Corporate Compliance and Ethics...

[Webinar] Navigating the Changing Cybersecurity Landscape - September 12th, 12:00 pm - 1:30 pm CT

Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more

Accelerynt, Inc.

Silent Threats, Unseen Risks: A Call to Transform Operational Security

Accelerynt, Inc. on

What if a single compromised credential could silently bring down your entire organization? Our recent threat hunts across Fortune 100 clients suggest that this isn't just a possibility—it's a reality....more

Fisher Phillips

Recent Snowflake Data Breach Exposes Dangers of Third-Party Data Platforms: Your 5-Step Plan After Suffering a Data Breach

Fisher Phillips on

When a prominent cloud storage company recently suffered a critical data breach that quickly developed into one of the largest data breaches of all time, it served as a wake-up call to companies to ensure that their data...more

Troutman Pepper

Notifying Law Enforcement of Security Incidents - Dear Mary – Incidents + Investigations Cybersecurity Advice Column

Troutman Pepper on

“Dear Mary” is Troutman Pepper’s Incidents + Investigations team’s advice column. Here, you will find Mary’s answers to questions about anything and everything cyber-related — data breaches, forensic investigations, how to...more

Woodruff Sawyer

Running to Stand Still: Practical Cybersecurity Governance Considerations for Boards and Management Teams

Woodruff Sawyer on

It’s obvious that strong cybersecurity governance should help to reduce a company’s risk of succumbing to a cybersecurity incident or being significantly impacted should one materialize. One major challenge: determining what...more

Katten Muchin Rosenman LLP

Privacy, Data and Cybersecurity Quick Clicks | Issue 20

Katten's Privacy, Data and Cybersecurity Quick Clicks is a monthly newsletter highlighting the latest news and legal developments involving privacy, data and cybersecurity issues across the globe....more

Alston & Bird

The Digital Download – Alston & Bird’s Privacy & Data Security Newsletter – August 2024

Alston & Bird on

Selected U.S. Privacy and Cyber Updates - New York AG Seeks Comments on Rulemaking for Minors’ Online Protection Laws - On August 1, 2024, New York Attorney General Letitia James issued two advanced notices of proposed...more

Perkins Coie

Cybersecurity for Lawyers: A Series

Perkins Coie on

If you are an attorney covering cybersecurity, not only do you have to stay on top of ever-evolving legal obligations and risks, you have to be able to speak competently with your technical counterparts....more

Morgan Lewis

The Framework of a Strong Family Office Cybersecurity Strategy

Morgan Lewis on

Cybersecurity is a critical element of effective family office operations management, yet many family offices need to further prepare for the range of cybersecurity threats they may face. Family offices manage significant...more

Faegre Drinker Biddle & Reath LLP

Countries Poised to Adopt New Cybersecurity Measures After UN Adopts Major Cybercrime Convention

On August 7, 2024, after three years of negotiation, the United Nation’s Ad Hoc Committee to Elaborate a Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal...more

3,786 Results
 / 
View per page
Page: of 152

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide