Cybersecurity Infrastructure

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

NARUC Release of Cybersecurity Guidelines should have Utility Companies on High Alert

On January 30, 2017, the National Association of Regulatory Utility Commissioners (“NARUC”) released Version 3.0 of “Cybersecurity A Primer for State Utility Regulators.”  This cybersecurity overview is an important reminder...more

China's 2016 Cybersecurity Law Will Change the Way Multinational Companies Do Business in China

China adopted its controversial Cybersecurity Law on November 7, 2016. The law, which will take effect on June 1, 2017, has broad implications for how multinational companies operate in China. The law addresses a number of...more

DHS Designates Election Infrastructure As “Critical” Amid Cybersecurity Concerns

In a January 6, 2017 statement, Secretary of Homeland Security Jeh Johnson announced that election infrastructure in the United States has been designated “critical” and worthy of the Department of Homeland Security’s (“DHS”)...more

Summary and implications of proposed 'Counteracting Russian Hostilities Act of 2017'

On January 10, 2017, a bipartisan group of senators released proposed sanctions legislation targeting Russia, entitled the “Counteracting Russian Hostilities Act of 2017” (the “Bill”). If enacted, the Bill would require the...more

Global Cybersecurity Threats to the Maritime Sector

Cybersecurity risks to the nation's critical infrastructure (CI) – defined as 16 CI sectors, including transportation and maritime – continue to grow exponentially. The incoming Trump Administration has made it clear that...more

"Looking Ahead: The U.S. Legal and Regulatory Environment Under a Trump Administration"

Election Day brought an end to a long period of uncertainty that caused market fluctuations and delayed business planning decisions. As we navigate the post-election landscape, many questions remain regarding the potential...more

Post-Election Outlook: A New, Unpredictable World

In a shock to investors and political analysts around the world, Donald J. Trump won the 2016 Presidential election, putting the Republican Party in charge of the White House and Congress for the first time in a decade. Even...more

Energy Bill Goes to Conference

On September 8, House and Senate conferees met for the first time to consider the North American Energy Security and Infrastructure Act of 2016, the comprehensive energy reform bill that has slowly been making its way through...more

International Task Force to Review Cyber Security of Wholesale Payments

The Bank for International Settlements' Committee on Payments and Market Infrastructures announced that it had established a task force to review the security of wholesale payments that involve banks, financial market...more

The Economy – Two Differing Ways to Grow the Economy and Create Shared Prosperity

Outside of their widely divergent tax plans, Secretary Clinton and Mr. Trump emphasize similar issues when discussing their priorities for economic development, including denunciation of Wall Street and the need for more...more

White House Issues Presidential Directive Coordinating Government Response To “Cyber Incidents”

On July 26, 2016, President Obama issued a new Presidential Directive setting forth the framework for how the United States (US) federal government will respond to “cyber incidents,” whether involving government or private...more

Rules of the (International) Road, Brexit, PPP as a New Tool for Argentina, and Keeping Non-U.S. Companies Safe from Suit (Expect...

- Post-Daimler: Are Non-U.S. Companies Safe from Suit in U.S. Courts? What if the Non-U.S. Parent Registers to Do Business in a State? - Rules of the (International) Road: Choosing and Appointing a Distributor ...more

Cyber Risk and Reality – Procuring Transportation in the 21st Century

With the rapid pace of innovation and deployment of intelligent transportation systems (ITS) to enhance existing transportation infrastructure, transportation officials frequently procure and manage sophisticated systems that...more

U.S. House Committee On Homeland Security Holds Hearing On States’ Preparation For Cyber Threats

On Tuesday, May 24, 2016, the U.S. House Committee on Homeland Security (the “Committee”) held a hearing titled “Enhancing Preparedness and Response Capabilities to Address Cyber Threats.” The hearing was convened jointly by...more

Cyber Attacks on Infrastructure are Increasing: Review Your Insurance As “Internet Of Things” Risks Grow and Change

In the December post Systemic Cyber Risks And The Internet of Things, we wrote about the increasing risk of cyber attacks on infrastructure and consumer products, and related insurance issues. We noted in that post that,...more

[Event] 2015 Cybersecurity Seminar: Identifying and Mitigating Data Breaches and Related Liabilities - Oct. 29th, Richmond, VA

October is National Cyber Security Awareness Month! Please join Williams Mullen, Marsh and EY for an in-depth discussion on effective strategies for identifying and mitigating data breach and related liabilities. WHO...more

Africa Update - September 2015 #4

Leading the News - Burkina Faso: On September 17th, U.S. National Security Advisor Susan Rice condemned the unconstitutional seizure of power by elements of the Presidential Security Regiment in Burkina Faso and...more

Why Federal and State Agencies are Considering Converting from a “Gallons Consumed” to a “Road Usage” Tax – And What are the Risks...

This Change, It’s a Coming (Maybe) - Many states and the federal government are seriously considering converting from a “gallons consumed” tax levy to a “miles driven” program for determining gasoline tax. There are...more

Energy bills move forward in Congress - Bipartisanship marks initial stage, but difficult debates may lie ahead

The US Senate and House of Representatives have taken significant steps in recent days to advance the first comprehensive energy legislation since the passage of Energy Independence and Security Act of 2007. Much has...more

House Passes the National Cybersecurity Protection Advancement Act

Following Wednesday’s approval of the Protecting Cyber Networks Act (H.R.1560) (“PCNA”), the House of Representatives passed the National Cybersecurity Protection Advancement Act (H.R. 1731) (“NCPAA”) on Thursday, a move...more

The IoT scrutinized by Telecom regulator

€ 1.55 bn of revenues for the Internet of Things (IoT) in Italy shows a growing market, but the report from the Communications Authority stresses the need for regulatory changes to boost the sector....more

Cyber Risk Insurance: Surging Demand and Evolving Coverage

Cyber risk insurers are doing a brisk business these days. Reports of data breaches abound, and risk managers are understandably looking to offload some of the risk through insurance. As a result, insurers are issuing new...more

Washington Insight - July 2014

In This Issue: - Progress Toward Comprehensive Patent Reform Stalls - As Attention Turns to a Border Supplemental, a Twelve Bill Omnibus Seems Certain - Highways, Taxes, and Partisanship: The Next...more

Data Protection and Privacy Laws in the Middle East

Justin Cornish is counsel in the Latham & Watkins Outsourcing and Technology Transactions Practice. He is a frequent speaker on the topic of data protection and privacy laws. With IT spending in the Middle East projected to...more

Infrastructure Alert - June 6, 2013

Following the I-5 bridge collapse in Washington and the Baltimore train derailment, expect a medley of Congressional hearings, investigations and proposed legislation to address the shortcoming of the national infrastructure...more

48 Results
|
View per page
Page: of 2
Popular Topics

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×