Cybersecurity

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Bridging the Week - May 2016

FINRA Hands Out Report Cards on Potential Spoofing and Layering: The Financial Industry Regulatory Authority said that it issued its first cross-market equities report cards aimed at helping member firms identify potential...more

OCR Director Discusses Phase 2 Audits, OCR Priorities

A representative of the U.S. Department of Health and Human Services Office of Civil Rights (OCR) recently presented at a compliance forum to provide comments regarding the roll out of OCR’s Phase 2 HIPAA audits. The...more

Business Litigation Alert: "Law Firms Victim to Data Breaches"

Recently, reports surfaced that multiple law firms have fallen victim to data breaches, prompting class action litigation against the firms for exposing their clients' information. Law firms house a great deal of highly...more

Five Nutshell Questions about Cybersecurity for the Board of Directors

On April 29, 2016, the Council of Institutional Investors (CII) published its new Special Report, Prioritizing Cybersecurity: Five Investor Questions for Portfolio Company Boards. ...more

Privacy & Cybersecurity Update - April 2016

In this edition of our Privacy & Cybersecurity Update, we examine changes to EU privacy and data protection laws, new state laws addressing data breach notifications, Congress' review of cyber insurance, and recent court...more

The Digital Download - Alston & Bird’s Privacy & Data Security Newsletter – May 2016

Special Focus on “Safe Harbor 2.0,” Privacy Shield and E.U. Data Transfers: Alston & Bird’s privacy team has been closely following the development of Privacy Shield, the proposed successor to the E.U.-U.S. Safe Harbor...more

Cybersecurity, Corporate Governance, and Risk Management: Best Practices

As litigators, we help clients resolve conflicts that have matured into disputes. In the realm of cybersecurity, we defend claims brought by private parties or governmental entities against companies facing the fallout from...more

Your daily dose of financial news The Brief – 5.2.16

Nearly a year-and-a-half after announcing their plans to join forces, Halliburton and Baker Hughes have reportedly called off their $35 billion merger. Serious DOJ reservations about the deal and a wildly changed energy...more

Indiana Governor announces formation of Indiana Executive Council on Cybersecurity

Indiana Governor Mike Pence announced last week the formation of the Indiana Executive Council on Cybersecurity through an Executive Order. The Council, comprised of 23 members from public and private organizations, is...more

Senator Tom Carper Questions Office Of Management And Budget Regarding Emerging Cybersecurity Technologies

On April 8, 2016, U.S. Senator Tom Carper, the ranking Democratic member of the Senate Homeland Security and Governmental Affairs Committee, sent a letter to Shaun Donovan, Director of the Office of Management and Budget...more

Fourth Circuit Upholds Coverage Under CGL Policy for Data Breach Claims

The United States Court of Appeals for the Fourth Circuit (“Fourth Circuit”) recently concluded that an insurer had a duty to defend a health care company that was sued by individuals whose personal health information was...more

Privacy & Cybersecurity Newsletter: April 2016

What seems like a long time ago now, in 2011 PricewaterhouseCoopers (PwC) warned that “there is no question that law firms are among the companies being targeted by cyber criminals.” Despite this, many law firms believed (or...more

Cybersecurity and Employee Benefit Plan Fiduciary Duties: Going Beyond HIPAA

It seems as though we hear about new cybersecurity issues every day — from traditional hacking incidents to the increasingly sophisticated phishing, malicious apps and websites, social engineering, and ransomware attacks. ...more

Survey says… New trends from corporate in-house counsel

Recently, Kroll and Kroll Ontrack surveyed over 170 corporate in-house counsel to share their perspectives on modern legal challenges facing organizations. We asked about some of the most pressing issues – from big data and...more

The Financial Report - Volume 5, No. 8 - April 2016 (Global)

There are currently only three SEC Commissioners, rather than the normal five. A recent New York Times article discussed what appears to be a logjam in the approval of two apparently highly qualified nominees for the open...more

Phishing and Spoofing Scams — A Few Tips to Protect Yourself and Your Business

The phone rings. The caller ID says it’s your attorney’s office. When you answer, you are told you owe your attorney additional money and are directed to call a toll-free number. When you call the number, you are told how...more

Venture Capital Coast to Coast – April 2016

VC WATCH - The Venture Capital “Reset” – We Were Expecting You - Venture capital fundraising declined in 2015, with total money raised down more than 9 percent and a 13 percent decrease in the number of fund...more

UK Financial Regulatory Developments - April 2016 #16

Payments UK launches Standards Collaboration Framework - Payments UK has launched a new Standards Collaboration Framework to help the industry better access and implement the standards it relies on. Payments UK also...more

US Senate Passes Bipartisan Energy Bill

The first broad energy bill passed in nearly a decade was passed by the Senate on April 20, 2016 with an 85-12 vote margin. The Energy Policy Modernization Act of 2016, S. 2012, responds to major changes to the energy...more

The Vendor Governance Wake-Up Call

The “Panama Papers” leak and other breaches at major law firms in the past year bear out the findings from the American Bar Association’s 2015 Legal Technology Survey Report. Earlier this month, 11.5 million documents were...more

Insurance News, Spring 2016

Hackers interfere with a GPS signal, causing a vessel’s onboard navigation systems to falsely interpret position and heading. Somali pirates employ hackers to infiltrate a shipping company’s network to identify vessels in the...more

New report warns health care industry to expect more ransomware attacks

A new report of a survey of around 30 mid-sized hospitals by the Health Information Trust Alliance (HITRUST) concludes that health care entities should be prepared for an increase in ransomware attacks in the near future....more

Cybersecurity Advice to CEOs and Boards “Take more responsibility”!

The White House and its top security advisors are regularly advised about cyberintrusions and as a result the “time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security”...more

Negotiating Cybersecurity Contractual Protections for Retirement Plans

The ERISA Advisory Council1 recently announced that, as part of its goals for 2016, it will be focusing on cybersecurity issues affecting retirement plans and, in particular, the extent to which such issues relate to...more

Alert on Ransomware Attacks and Prevention

Imagine entering your office, sitting down with a cup of coffee, and going through the routine task of logging on to your computer to review your emails and schedule for the day. Except this time, there is a problem. A...more

3,024 Results
|
View per page
Page: of 121
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×